TWI299454B - Method and system for generating a communication coupon to establish a communication channel using a server - Google Patents
Method and system for generating a communication coupon to establish a communication channel using a server Download PDFInfo
- Publication number
- TWI299454B TWI299454B TW093119483A TW93119483A TWI299454B TW I299454 B TWI299454 B TW I299454B TW 093119483 A TW093119483 A TW 093119483A TW 93119483 A TW93119483 A TW 93119483A TW I299454 B TWI299454 B TW I299454B
- Authority
- TW
- Taiwan
- Prior art keywords
- communication
- user
- communication channel
- network
- token
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims description 200
- 238000000034 method Methods 0.000 title claims description 43
- 230000008439 repair process Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 4
- 230000001360 synchronised effect Effects 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 3
- 235000013405 beer Nutrition 0.000 claims description 2
- 230000008859 change Effects 0.000 claims description 2
- 238000006243 chemical reaction Methods 0.000 claims 2
- 238000004883 computer application Methods 0.000 claims 2
- 241000208340 Araliaceae Species 0.000 claims 1
- 241000195493 Cryptophyta Species 0.000 claims 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims 1
- 235000003140 Panax quinquefolius Nutrition 0.000 claims 1
- 229940085805 fiberall Drugs 0.000 claims 1
- 235000008434 ginseng Nutrition 0.000 claims 1
- 238000010422 painting Methods 0.000 claims 1
- 244000144977 poultry Species 0.000 claims 1
- 239000013589 supplement Substances 0.000 claims 1
- 230000004044 response Effects 0.000 description 28
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 7
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 4
- 240000002853 Nelumbo nucifera Species 0.000 description 4
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 4
- 238000012217 deletion Methods 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 239000003999 initiator Substances 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000037007 arousal Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 210000003205 muscle Anatomy 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 241000270730 Alligator mississippiensis Species 0.000 description 1
- 241000283690 Bos taurus Species 0.000 description 1
- 101100492787 Caenorhabditis elegans mai-1 gene Proteins 0.000 description 1
- 241001494479 Pecora Species 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000000763 evoking effect Effects 0.000 description 1
- 235000011389 fruit/vegetable juice Nutrition 0.000 description 1
- 235000003642 hunger Nutrition 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000009423 ventilation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/0024—Services and arrangements where telephone services are combined with data services
- H04M7/003—Click to dial services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42195—Arrangements for calling back a calling subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/0024—Services and arrangements where telephone services are combined with data services
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
1299454 五、發明說明(1) 一、 【發明所屬之技術領域】 本發明係關於通訊網路中通訊通道(channel )的建 立’特別是關於使第一使用者得以提供第二使用者一持續 網路物件(persistent network object)(例如一訊標 token或符記coupon )的系統。藉此系統,第二使用者可 於第一網路中在第一與第二使用者間建立通訊通道,第二 使用者經一第二網路喚起(invoking)此建立。 二、 【先前技術】 假設第一使用者要經由特定網路(例如一通電話) (或一糸列通道)與第二使用者溝通。目前第一使用者可 利用即時傳訊(Instant Messaging,IM )和標準電話服 矛务(standard telephone service )(普通舊式電話月艮 務,POTS , plain old telephon e service ),這兩種皆 容許第一使用者要求與第二使用者建立通訊通道(例如一 電話對話),而第二使用者可接受或拒絕此要求。然而, 在這兩種情形中,要求以及通訊通道都要使用相同的網路 與協定。此外,此要求是同步的,意味著第一使用者必須 等第二使用者決定;假如第一使用者刪除要求的這一邊的 客端(c 1 i e n t )(例如關閉他們的即時傳訊客端,或掛上 他們的電話),此要求則被刪除。 例如Verizon的電話服務提供者所提供的一個功能-一 來電紀錄(cal 1 hi story )提供一紀錄,使第二使用者1299454 V. INSTRUCTIONS (1) 1. Technical Field of the Invention The present invention relates to the establishment of a communication channel in a communication network, particularly regarding enabling a first user to provide a second user-continuous network. A system of persistent network objects (such as a token token or a coupon). With this system, the second user can establish a communication channel between the first user and the second user in the first network, and the second user invoking the establishment via a second network. 2. [Prior Art] It is assumed that the first user wants to communicate with the second user via a specific network (for example, a telephone) (or a queue). At present, the first user can use Instant Messaging (IM) and standard telephone service (POTS, plain old telephon e service), both of which allow the first The user requests to establish a communication channel with the second user (eg, a telephone conversation), and the second user can accept or reject the request. However, in both cases, the same network and protocol are required for the requirements and communication channels. In addition, this requirement is synchronous, meaning that the first user must wait for the second user to decide; if the first user deletes the requested side of the client (c 1 ient ) (eg, close their instant messaging client, Or hang their phone), this request is deleted. For example, a function provided by Verizon's telephone service provider - a call record (cal 1 hi story ) provides a record for the second user
1299454 五、發明說明(2) (即接收者recipient )得以在第一使用者已掛掉電詁之 後’嘗試產生回給第一使用者的電話通訊通道。這裡所有 的通訊須經單一通訊通道(即p0TS )傳送。此外,第,使 用者無法提供第二使用者,關於初始要求的任何額外資訊 (例如要求之原因或緊急程度)。 電話郵件(Phone Mai 1 )這個功能容許第一使用者要 求弟二使用者在一給定通訊通道的連通,以及留下訊息一一 包含關於通訊要求的資訊―讓第二使用者於第一使用者終 止他們的客端(例如掛電話)後,仍可檢閱之。這裡第二 使用者須使用與第一使用者相同的通訊通道要求方法,以 容許由第一使用者建立通訊通道(通常稱為電話標註 phone tag ) 〇 由 RingCentral,Inc’s Buz Me!TM 產品提供的服務、 線上來電等待(〇nline —Call—Waiting)支援下列情况· 一第二使用者接收來自第一使用者的一通(p〇TS )電話 當其正使用電話線網路進接(netw〇rk access)時。卷 ί月況發生日寸’彈出式對話視窗(p〇p —Up diai〇g )會出現 在第二使用者的螢幕上,容許他們接受或拒絕電話要求 這裡所有給第_使用者的數據(d a t a )須經其電話連線· 將數據與電話網路連線分離係不可能的。 ’ 貝爾實驗室發展的〜㈣^七丨⑶^容許一第一使用者提1299454 V. INSTRUCTION DESCRIPTION (2) (ie, the recipient) is able to attempt to generate a telephone communication channel back to the first user after the first user has hanged the power. All communications here are transmitted via a single communication channel (ie p0TS). In addition, the user is unable to provide the second user with any additional information about the initial requirements (such as the reason or urgency of the request). Phone Mai 1 allows the first user to request the second user to connect to a given communication channel, and to leave a message containing information about the communication requirements - to let the second user use it first. After terminating their client (such as hanging a phone), they can still review it. Here, the second user must use the same communication channel requirement method as the first user to allow the first user to establish a communication channel (commonly referred to as a phone tag), provided by RingCentral, Inc's Buz Me!TM product. Service, online call waiting (〇nline - Call-Waiting) supports the following situations: A second user receives a one-way (p〇TS) call from the first user when he is using the telephone line network to connect (netw〇rk Access). The volume 月 日 ' ' pop-up dialog window (p 〇 p - Up diai 〇 g ) will appear on the second user's screen, allowing them to accept or reject the call to all data given to the _ user ( Data ) must be connected via its telephone. It is impossible to separate the data from the telephone network. 'Bell Labs' development of ~ (four) ^ seven 丨 (3) ^ allows a first user to mention
第9頁 1299454Page 9 1299454
五、發明說明(3) 供第二使用者一數據網路物件(data network object),如此可供應第二使用者訊息,亦可提供第一 用者圖不(icon)。运些圖不將建立於第一使用者之不 型態通訊通道(包含但不限於電話)。此網路物件也可2 供關於第一使用者的通訊通道的狀態資訊,如最近的使= 情況。此技術不容許第一使用者指定其與第二使用者建立 之連線特定類型。V. Description of the Invention (3) A second user, a data network object, can supply a second user message, and can also provide a first user icon. These diagrams will not be established on the first user's non-type communication channel (including but not limited to telephone). The network object can also provide status information about the first user's communication channel, such as the recent enable = condition. This technique does not allow the first user to specify a particular type of connection that they have established with the second user.
Blackberry裝置上的語音服務容許第一使用者從 Blackberry裝置上執行的一個程式(例如一個新的通訊錄 應用程式),要求打一通電話至第二使用者,第二使用者 經POTS接收此通電話。因所有的數據在電話網路中流動且 要求皆為同步,此服務和標準電話伺服器在功能上並沒有 不同。 R0LM電話服務提供的Camp On功能處理以下情形:第 一使用者打電話給第二使用者,而第二使用者的電話忙 碌。啟動此功能時,此功能會監視第二使用者的電話線, 當電話線有空時,會先呼叫第一使用者,接著啤叫第二使 用者。此功能只使用一個通訊網路··第一與第二使用者都 不能經由數據網路應用取得任何此通電話的狀態指示。 第一使用者可提供第二使用者一電話卡(CaU丨叫 Card),此電話卡用於支付第二使用者打的所有電話的費The voice service on the Blackberry device allows a first user to execute a program (such as a new address book application) from the Blackberry device, requesting a call to the second user, and the second user receiving the call via the POTS. . Since all data flows over the telephone network and the requirements are synchronized, this service is not functionally different from the standard telephone server. The Camp On function provided by the R0LM telephone service handles the situation where the first user calls the second user and the second user's phone is busy. When this feature is activated, this feature monitors the second user's phone line. When the phone line is available, the first user is called first, and then the beer is called the second user. This feature uses only one communication network. • Both the first and second users cannot get any status indications for this call via the data network application. The first user can provide a second user, a calling card (CaU), which is used to pay for all the calls made by the second user.
1299454 五、發明說明(4) 1使用、ί Ϊ二Ϊ用者是以特別規定的方式打電話(例如第 一 、9明戳印在卡上的帳號)。熟此技藝者可I#合 二:第二使用者可使用電話卡獲得-數據網路連i、 $ °們的電腦經由使用類比電話線的數據機),電★ 卡可支付電話與數據網路通訊兩者。電話 ° 用者打給誰,…制通訊通道(即第一使用者:㈡ 他們如何聯絡)。 a ”、、次彳曰疋 來電轉接(Call forwarding )功能,如 -------------(案二二9 (案號IBMYOR9-2 0 00-〇1〇2),標題「提 1 998-0263 ),標題「傳送者指定發送客製化」,以及 :可擴充普遍通知服務之方法與裝置」中所描述不,皆提供 尋找以及建立第一與第二使用者間的通訊連線之方法,但 皆無提供方法,使第一佶田去π丨v产 哲 一 一 优弟使用者付以在一弟二網路中初始化 a笛二f此要求藉持續數據網路物件經第'網路發送 給弟一使用者。 雖然文中提到的每一通訊系統功能適於其各自的目 的,此技藝中仍需要使一 A ^ h炎弟使用者付以楗供第二使用者於 yN 型怨的通訊通道的能力。此能力妳第-通 訊通道轉接(relay) 一# ,日力、,二弟一通 田。+此七μ # y」、、口弟一使用者,且由苐二使用者運 用 此月b力於弟一传用束/AA ^ ^ 'V- yz, 便用者攸第一通道斷線後仍持續,且此 月b力對第一使用者的可胼 f . U · 1 · 、 4』聯絡性(availability )反應靈敏1299454 V. INSTRUCTIONS (4) 1 Use, ί Ϊ Ϊ 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话 打电话Those skilled in the art can use I# in combination: the second user can use the phone card to obtain - the data network is connected to the i, the computer of the user's computer via the analog phone line), the electric card can pay the phone and the data network Both communication. Telephone ° Who is the user, ... the communication channel (ie the first user: (2) how they contact). a "," Call forwarding function, such as ------------- (Case 2:9 (Case No. IBMYOR9-2 0 00-〇1〇2) , title "1 998-0263", title "Transporter Designated Sending Customization", and: "Methods and Devices for Expandable Universal Notification Service", all of which provide for finding and establishing first and second users The method of communication connection, but there is no way to provide the first 佶 去 去 丨 产 哲 哲 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优 优The road object is sent to the younger user via the 'network. Although each of the communication system functions mentioned in the text is suitable for their respective purposes, there is still a need in the art for an A^h user to pay for the second user's yN-type communication channel. This ability 妳 first-communication channel relay (relay) ##, 日力,,二弟一通田. +This seven μ # y", a user of the younger brother, and the second user disconnected from the first channel by the second user using this month b force to the younger one. /A ^ ^ 'V- yz After the continuation, and this month b force is sensitive to the first user's 胼f. U · 1 · , 4 』availability
12994541299454
例如當聯絡不到第一使用者時,將失去此能力)。 $此吾人高度期望能夠提供一系統和方法,使第一使 用者得以提供第二使用者,於其間建立一第一型態的通訊 通道=此力。此能力經第二通訊通道轉接給第二使用者以 及由第二使用者運用。此能力於第一使用者從第一通道斷 線後仍持續,且此能力對第一使用者的可聯絡性反應靈敏 (例如當聯絡不到第一使用者時,將失去此能力)。 三、【發明内容】 根據本發明,提供一系統與方法供建立第一與第二方 之間的通訊通道。在一實施例中,產生由第一方初始化 (initiate)的一要求,供在第一通訊網路中,於第一與 第二方之間建立通訊通道。中間伺服器裝置 (intermediary server device)中斷要求的接收,並嘗 試產生通道。若此嘗試不成功,此伺服器裝置將要求轉換 (trans 1 at e )為數據網路物件,此數據網路物件經第二 通訊網路傳遞給第二方。此網路物件使第二方得以溝通 (communicate)其接受(acceptance),並第一通訊網 路中建立其與第一方的通訊。第二方在接收當時或之後喚 起(invokes )網路物件,以初始建立第一與第二方之間 通訊通道產生。此外,第一方可建立符記(coup〇n )形式 的網路物件供直接與第二方通訊,無須產生建立通道的第 一先前嘗試(first prior attempt)。For example, when the first user is not contacted, this ability will be lost). It is highly desirable for us to provide a system and method for the first user to provide a second user to establish a first type of communication channel = this force. This capability is transferred to the second user via the second communication channel and by the second user. This capability continues after the first user disconnects from the first channel, and this ability is responsive to the first user's liaison (e.g., when the first user is not contacted, this capability is lost). Summary of the Invention According to the present invention, a system and method are provided for establishing a communication channel between a first party and a second party. In one embodiment, a request initiated by the first party is generated for establishing a communication channel between the first and second parties in the first communication network. The intermediate server device interrupts the requested reception and attempts to generate a channel. If the attempt is unsuccessful, the server device will request a trans 1 at e data network object that is passed to the second party via the second communication network. This network object enables the second party to communicate its acceptance and establish its communication with the first party in the first communication network. The second party invokes the network object at or after the reception to initially establish a communication channel between the first and second parties. In addition, the first party can establish a network object in the form of a coup〇n to communicate directly with the second party without first generating a first prior attempt to establish a channel.
12994541299454
有利地是,無論第 可在接收當時或之後喚 一使用者的連線狀態’第二使用者 起網路物件。 四、【實施方式】 本發明定義'一李鮮访? 馇-冰田上、s 糸、、、充與方法,使第一使用者得以要求與 第一使用者通電話,繁一 .^ , 弟—使用者藉數據網路物件接收此要 ^ 楚 、、罔路物件為「通訊能力符記」。根據第 .社w、, 首則可稭此通訊能力符記接收此要 求,接者初始化建立1^ 思立其與第一使用者間之通話。 圖一例示根據 1000中,第一使用 於圖二至圖 點(例如一 冬發明第一實施例之 如一標準電 照圖 建立 功, 中, 給第 於步 第二 在此 二至圖 此通電 此流程 符記伺 二使用 驟 1 0 4 0 使用者 符記被 九所詳 網路連 洁)發 t詳細 話。步 終止於 服器詢 者。若 中,符 。如參 產生到 者要求與第二 細描述之内同 線電腦)發出 出。步驟1 0 1 〇 描述)接收第 驟1 0 2 0中,檢 步驟1 0 7 0。若 問第一使用者 否,此流程終 記伺服器產生 照將於圖四至 第二使用者對 使用者 ,此要 ,或從 中,中 一使用 查此嘗 不成功 是否要 止於步 產生一 圖七言羊 其回應 肌往的 電話對 求可從 電話網 間符記 者的要 试是否 ’則於 傳送通 驟 1 0 7 0 符記並 &所描 的期間 數據網蹲 路節點彳 伺服器彳 求,ϋ γ 成功。$ 步驟1 ο 3 d 能力符 。若是, 將其傳埃 述的内I ’此符#Advantageously, the second user acts as a network object regardless of the connection state of the user at the time of receipt or subsequent reception. Fourth, [Implementation] The present invention defines 'Ili fresh visit? The 馇-ice field, s 糸, , and charging methods enable the first user to request a call with the first user, and the user-user receives the data through the data network object. The Kushiro object is the "communication capability token". According to the first, the first, the communication capability can receive this request, and the receiver initializes the call between the first user and the first user. An example is shown in FIG. 1000, the first use of FIG. 2 to the point of view (for example, a first embodiment of a winter invention, such as a standard electrogram to establish work, in the second step, in the second to the figure, this is energized The flow of the message is recorded by the second use of the 1 0 4 0 user's note is sent to the details of the nine detailed network. The step ends with the service inquirer. If the middle, the character. If the request is made and the same as the second detailed description, the same computer will be issued. Step 1 0 1 〇 Description) Receive the first step 1 0 2 0, check step 1 0 7 0. If the first user is not asked, the process will be generated by the server at the end of the message. The user will be shown in Figure 4 to the second, and if the user wants to use it, or if the user wants to use it, it is not successful. Seven words sheep in response to the muscles of the phone to seek from the telephone network reporters to test whether it is in the transmission pass 1 0 7 0 tokens & the period described data network network node 彳 server 彳Seeking, ϋ γ success. $ Step 1 ο 3 d Capabilities. If yes, pass it to the inside of I ’ this character#
第13頁 1299454 五、發明說明(7) 被修改。這些修汾 不到第一使用者护i含但不限於:1)符記伺服器在聯絡 2)符記伺服器回暫時停用UeaCtivate)符記;以及 驟1〇5〇中,符記^來的要求’刪除符記。步 步驟1 055中,符与态荨待弟二使用者回應此符記,且於 要求,則於步驟器,查此回f °若第二使用者拒絕 程終止於步驟1 〇7n * ,符記伺服器刪除符記,接著此流 Φ 驟1 060,符記甸服1 ^第二使用者接受符記的要求’於步 話。接著,繼續至::第一與第二使用者間建立-通電 此流程終止於步驟;; = ,符記伺服器刪除符記,之後 熟此技藝者可田 服器刪除符記) 解,4 ^程可消去步驟1 0 6 5 (符記伺Page 13 1299454 V. Description of invention (7) Modified. These repairs are not limited to the first user protection, but are not limited to: 1) the token server is in contact 2) the proxy server is temporarily disabled UeaCtivate); and in the first step, the token is ^ The request to 'delete the token. Step 1 055, the character and the state of the second user respond to the token, and if requested, then in the stepper, check this back f ° if the second user refuses to terminate in step 1 〇 7n * The server deletes the token, and then the stream Φ is 1 060, and the second user accepts the requirement of the token 'in the step. Then, proceed to:: establish between the first and second users - the process is terminated in the step;; =, the server deletes the token, and then the skilled person can delete the token), 4 ^Cheng can eliminate step 1 0 6 5
二使用者的回i::繼續至步,5〇’符記祠服器等待第 用者使用超過—次T伸:符記得以被給定的第二使 小孩,此符記讀丨上。例如豕長可傳送符記給在大學的 程,小茯可二:'、孩可以打電話給家長。ϋ此修改過的流 ΐ過即接受)符記。貝“匕修 話給第-使用者的能;:權給第二使用者打電 此外,參照將於圖十七 力符記也可用以使第一使用 定逛悲的通訊,其中第二使 長可給其小孩一通訊能力符 所洋細描述的内容,一通訊能 者得以支付與第二使用者間特 用者可建立每次通訊。例如家 記’此通訊能力符記紀錄並支The second user's return i:: continue to the step, 5 〇 '符 祠 祠 等待 等待 等待 等待 等待 等待 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 第 记得 记得 记得 记得 记得For example, the length of the transfer can be recorded in the course of the university, Xiao Xiao can two: ', children can call the parents.修改This modified stream is over accepted).贝 "匕修匕 to the first-user's ability;: the right to power the second user. In addition, the reference will be used in Figure 17 The content that can be described by the child's communication ability, a communication person can pay and the second user can establish each communication. For example, the family record 'this communication ability record and support
12994541299454
付此小孩打給家長的每通電話。需注意到符記僅可以打電 活’且這些電話必須是打給家長的。Pay every call the child calls to the parent. It is important to note that the tokens can only be used for electricity and that these calls must be made to parents.
^圖二描繪第一較佳實施例之網路拓撲(topology )之 ,例。如圖所示,第一使用者25〇〇和第二使用者251〇分別 二不為「使用者1」和「使用者2」,使用者j ⑽具有數 據網路節點2520和電話網路節點25 30兩者;而使用者2 2 5 1 0具有數據網路節點2 5 4 〇和電話網路節點2 5 5 〇兩者。數 ,網路節點2 5 2 0和2 5 4 0兩者皆連線至數據網路2 5 6 〇,而電 居、、周路節點2 5 3 0和2 5 5 0兩者皆連線至電話網路2 5 7 〇。還有 付。己飼服器2 5 8 0連線至數據網路2 5 6 0和電話網路2 5 7 0兩 者’以及通知伺服器(n〇tificati〇n server) 2585連線 至數據網路2560。 數據網路2 5 6 0的範例包含但不限於:網際網路與私用 内部網路(private intranet)。 電活網路2 5 7 0的範例包含但不限於:標準電話網路, 由Verizon 'AT&T與類似業者所提供者。 數據網路節點2520和2540 (參照圖八與圖九詳細描 述)可包含但不限於:執行W i ndow s 9 5以及例如微軟FIG. 2 depicts a topological example of the first preferred embodiment. As shown, the first user 25 〇〇 and the second user 251 〇 are not "user 1" and "user 2" respectively, and user j (10) has a data network node 2520 and a telephone network node. 25 30 Both; and the user 2 2 5 1 0 has both the data network node 2 5 4 〇 and the telephone network node 2 5 5 。. The number of network nodes 2 5 2 0 and 2 5 4 0 are both connected to the data network 2 5 6 〇, while the electricity, and the road nodes 2 5 3 0 and 2 5 5 0 are connected. To the telephone network 2 5 7 〇. Also pay. The feed server 2580 is connected to the data network 2 5 6 0 and the telephone network 2 5 7 0 and the notification server (n〇tificati〇n server) 2585 is connected to the data network 2560. Examples of data network 2 5 6 0 include, but are not limited to, the Internet and private intranet. Examples of live network 2 5 70 include, but are not limited to, standard telephone networks, provided by Verizon 'AT&T and similar providers. Data network nodes 2520 and 2540 (described in detail with reference to Figures 8 and 9) may include, but are not limited to, executing W i n dow s 9 5 and, for example, Microsoft
Internet Explore的網頁瀏覽器的IBM ThinkPad,或是執 行MacOS 8· 5. 6以及如網景Navi gator的網頁瀏覽器的Internet Explorer's web browser for IBM ThinkPad, or for MacOS 8.5.6 and web browsers like Netscape Navi gator
第15頁 1299454 五、發明說明(9)Page 15 1299454 V. Description of invention (9)
Apple’s Power Macintosh。數據網路節點 2520 和 2540 也 可包含可連網路的行動(例如可攜式)裝置,如I 以 WordPad商標銷售的裝置。數據網路節點2520和2540亦可 包含智慧蜂巢式(smart cellular)電話(例如可作為蜂 巢式電洁’也可執行網頁劇覽器之類的網路應用程式的裝 置),例如Nokia, Inc以商標Nokia 9000i銷售的蜂巢式 電話。 電話網路節點2530和2550可包含任何可支援經由電話 網路2570通訊的裝置,包含例如Veriz〇n銷售的標準電 活,以及Nokla以商標N〇kia 9〇〇〇i銷售的行動電話。 與電用Γ500和2510皆只有單-數據網路節點 ^上。而且,卩跄、本發明可支援每一使用者使用超過一個 過兩個。 然、所不只有兩個使用纟’本發明可支援超 據網路節點與電話網路7^〇1:^00 0 1銷售的),可作為數 以及2540和2550之ΐ 兩者。因此裝置對252〇和2530 之Ί兩者可料—裝置實 符記伺服器2580 何運算節點,包含但 (參照圖 不限於: 三至七有詳細描述)可為任 執行微軟以商標Windows 1299454 五、發明說明(ίο) NTTM銷售的作業系統與伺服器應用程式套裝軟體、受讓人 International Business Machines Corporation (IBM Corporation )以商標PowerPCTM銷售的產品。此外,為支 援電信(telecommunication)應用,符記伺服器2 580裝 備有電話通訊硬體與軟體,包含但不限於:Inte;l Corporation的電信產品群所供應的裝置(詳細請參照 http.//www. intel. com/design/network/products/telec om/i ndex.htm )。熟此技藝者應可理解,雖然數據網路節 點2520和2540使用HTTP協定與符記伺服器2580通訊,本發 明也可以其他協定實施,這些協定包含但不限於一般通道 (genera 1 sockets )(詳細請見Doug 1 as Comer 為作者的 「用TCP / IP網際網路連線之原理、協定與架構,Apple’s Power Macintosh. Data network nodes 2520 and 2540 may also include network-enabled mobile (e.g., portable) devices, such as I, which are sold under the WordPad trademark. Data network nodes 2520 and 2540 may also include smart cellular phones (e.g., devices that can be used as a cellular device or a web application such as a web browser), such as Nokia, Inc. The cellular phone sold under the trademark Nokia 9000i. Telephone network nodes 2530 and 2550 can include any device that can support communication over telephone network 2570, including, for example, standard services sold by Veriz〇n, and mobile phones sold by Nokla under the trademark N〇kia 9〇〇〇i. Both the Γ500 and 2510 are only on the single-data network node. Moreover, the present invention can support more than one use per user. However, not only two uses, but the invention can support both the network node and the telephone network 7^〇1:^00 0 1 , can be used as the number and between 2540 and 2550. Therefore, the device can be used for both 252〇 and 2530—the device does not count the server 2580 operation node, but (but the figure is not limited to: three to seven are described in detail) can be executed by Microsoft under the trademark Windows 1299454 , Invention Description (ίο) NTTM sales operating system and server application suite software, the product sold by the assignee International Business Machines Corporation (IBM Corporation) under the trademark PowerPCTM. In addition, in order to support telecommunication applications, the token server 2 580 is equipped with telephone communication hardware and software, including but not limited to: Inte; l Corporation's telecommunications product group supply device (for details, please refer to http.// Www.intel.com/design/network/products/telec om/i ndex.htm ). It will be understood by those skilled in the art that although data network nodes 2520 and 2540 communicate with token server 2580 using HTTP protocols, the present invention can be implemented in other protocols including but not limited to general channels (genera 1 sockets) (detailed See Doug 1 as Comer for the author's "Principles, Agreements, and Architectures for TCP/IP Internet Connections.
Vol.l」,Prentice Hall, Englewood Cliffs, NewVol.l", Prentice Hall, Englewood Cliffs, New
Jersey, 1991 ) 〇 通知伺服器2585係可作為客端裝置之通訊伺服器的任 何運算節點,如同分別參照圖三與圖八有所更詳細描述的 通知處置(handler )3100、8060。此處包含但不限 於:執行微軟以商標Windows NT銷售的作業系統與伺服器 應用程式套裝軟體、IBM Corporat ion以商標PowerPCTM銷 售的產品。此節點也可執行傳訊伺服器應用程式,包含但 不限於Lotus以商標samet ime銷售的產品。熟此技藝者應 可理解’此傳訊伺服器應用軟體也可在符記伺服器2580上 執行。熟此技藝者亦應可理解,有不需要任何中央伺服器Jersey, 1991) 通知 Notification Server 2585 is any computing node that can act as a communication server for the guest device, as described in more detail with reference to Figures 3 and 8, respectively, of notification handlers 3100, 8060. This includes, but is not limited to, the implementation of Microsoft's operating system and server application suites sold under the trademark Windows NT, and IBM Corporion's products sold under the trademark PowerPCTM. This node can also execute a messaging server application, including but not limited to products sold by Lotus under the trademark samet ime. Those skilled in the art should understand that the messaging server application software can also be executed on the token server 2580. Those skilled in the art should also understand that there is no need for any central server.
第17頁 1299454 五、發明說明(11) (c e n t r a 1 s e r v e r )的傳訊系統,例如g r 〇 〇 v e產品所提供 的傳訊系統。 給定通訊能力符記提供的數據,包含第一使用者的識 別(i d e n t i f i c a t i ο η ’ I D ),以及他們的電話網路節點 2 5 3 0的電話號碼,以及第二使用者的電話網路節點2 5 μ的 電話號碼,和他們的數據網 稱(host name ) 〇通訊能; 到第二使用者的訊息,例如 使用者被容許喚起給定符記 (即讓使用者通電話),就 數。此符記可額外指明第一 可給小孩符記,有此符記可 他們願意支付的總額。此外 嘗試插入(break into)使 通訊通道之連線。例如,這 具有插播(break-in)能力 求通話時,即使丈夫剛好在 通話。 路郎點2 5 4 0的IP位址或主機名 7符記也可指明從第一使用者 來電原因。它可額外指明第二 的次數,每次符記被成功使用 遞減(decrement) —個計 方願意支付的費用,例如家長 打電話給家長,但家長可指定 ,符記可指明使用者2 2 5 1 〇可 用者1可能已具有的任何現有 個丈夫得以給他懷孕的妻子 的通訊能力符記,使得妻子要 電居上與他人通話,仍可建立Page 17 1299454 V. Inventions (11) (c e n t r a 1 s e r v e r ) messaging systems, such as the communication systems provided by g r 〇 〇 v e products. The data provided by the given communication capability identifier includes the identification of the first user (identificati ο η ' ID ), and the telephone number of their telephone network node 2 5 3 0, and the telephone network node of the second user. 2 5 μ phone number, and their data network (host name) 〇 communication can; to the second user's message, for example, the user is allowed to call the given token (ie, let the user call), . This token can additionally indicate the first child token, which is the total amount they are willing to pay. Also try to break into the connection of the communication channel. For example, this has the ability to break-in when making a call, even if the husband is just on the phone. The IP address or host name of the Lu Lang point 2 5 4 0 can also indicate the reason for the call from the first user. It can additionally indicate the second number of times, each time the token is successfully used to decrement - a fee that the party is willing to pay, such as the parent calling the parent, but the parent can specify, the token can indicate the user 2 2 5 1 〇Available person 1 may have any existing husband to give his pregnant wife a communication ability token, so that the wife has to call the other person to talk to others, still can be established
給定符記可以具有第一或 治號碼。假如說一給定符記具 話號碼,則當第二使用者喚起 一個號碼直至找到一個有空閒 第二使用者多於一個單一電 有第一使用者三個不同的電 此符記,符記伺服器會試每 的。類似地,若給定符記具A given token can have a first or a number. If a given token is recorded with a number, then the second user evokes a number until a second user is found to have more than one single power and the first user has three different electrical tokens. The server will try every one. Similarly, if given a token
第18頁 1299454Page 18 1299454
有1二使用者三個不同的電話號碼,則第二使用者喚起符 έ己日守,可指定他們要用哪一個號碼。There are two different phone numbers for the two users, and the second user evokes the call, and can specify which number they want to use.
圖二為一方塊圖,描繪符記伺服器2 58〇架構的一样细 範例,此符記伺服器258〇架構供管理通訊能力符記以及建 立電話網路為基礎的通訊。伺服器2 5 8 〇較佳包含一 CPU 3000、儲存裝置3010 (例如一碟或直接存取儲存裝置 DASD); —數據網路介面3〇2〇、一電話網路介面3〇32、以 及記憶體3040 (例如隨機存取記憶體Ram )。根據本發 明,符記伺服器邏輯(將參照圖四詳細討論)較佳地被實 施為電腦可執行碼。此電腦可執行碼從遠端(例如從數^ 網路2560經數據網路介面mm)、或從本地永久光學 (CD ROM)或磁儲存裝置(例如碟或直接存取儲存裝置 DASD 3010 )下載至記憶體3〇4〇,供CPU 3000執行。數據Figure 2 is a block diagram depicting the same fine-grained example of the Server 2 Architecture, which is used to manage communication capabilities and establish telephone network-based communications. The server 2 5 8 〇 preferably includes a CPU 3000, a storage device 3010 (for example, a disc or a direct access storage device DASD); a data network interface 3〇2〇, a telephone network interface 3〇32, and a memory. Body 3040 (eg, random access memory Ram). In accordance with the present invention, the token server logic (discussed in detail with reference to Figure 4) is preferably implemented as a computer executable code. This computer executable code can be downloaded from the remote end (for example, from the number 2 network 2560 via the data network interface mm), or from a local permanent optical (CD ROM) or magnetic storage device (such as a disc or direct access storage device DASD 3010). To memory 3〇4〇, for CPU 3000 to execute. data
網路2 5 6 0與伺服器2 5 8 0間來回的通訊係經由數據網路介面 3020,通訊型態包含但不限於乙太網路(Ethernet )、訊 標環(t 〇 k e n r i n g )、和無線方式(例如射頻和紅外線為 基礎的)。電話網路2570通訊,包含裝置2530和2550之間 的,都經由電話網路介面3〇30管理。較佳實施例中,符記 饲服^§ 2580為父換機(pbx),管理與第一使用者的電話 網路卽點2 5 3 0來回的所有電話。如前述,此能力可以硬體 和軟體提供’包含但不限於:Intel Corporation銷售的 產品 (http://www.intel.com/design/network/products/telThe communication between the network 2 5 6 0 and the server 2 5 8 0 is via the data network interface 3020, and the communication type includes but is not limited to an Ethernet, a t-ring ring, and Wireless (such as RF and infrared based). The telephone network 2570 communication, including between devices 2530 and 2550, is managed via the telephone network interface 3〇30. In the preferred embodiment, the signature service ^ 2580 is the parent swap (pbx), which manages all calls to and from the first user's telephone network point 2 5 3 0. As mentioned above, this capability can be provided by hardware and software 'including but not limited to: products sold by Intel Corporation (http://www.intel.com/design/network/products/tel
第19頁 1299454 五、發明說明(13) ecom/index· htm有細節)。記憶體3040之較佳實施例包含 一電信處置器(telcom handler) 3050 (參照圖四和五會 有更詳細討論)、一符記管理處置器(c 〇 u ρ ο η management handler ) 30 60 (參照圖四和六會有更詳細討 論)、一符記回應處置器(coupon response handler ) 3 0 7 0 (參照圖四和七會有更詳細討論)、一符記資料庫 3 080、一交換機處置器(pbx handler ) 3090、和一通知 處置Is 3 1 0 0。支援符記資料庫3 〇 8 0的產品範例包含但不限 於IBM公司以商標DB/2銷售的資料庫伺服器產品。熟此技 藝者可理解,符記資料庫3080可於另一遠端網路連接節點 執行,並經數據網路2 5 6 0存取(a c c e s s )。支援交換機處 置器30 90的產品範例包含intei公司以產品名稱me DL-3002銷售之產品,包含它的支援軟體。支援通知處置器 3100的產品範例包含但不限於Lotus以商標Sametimd/ 的產品。Page 19 1299454 V. Invention Description (13) ecom/index·htm has details). The preferred embodiment of memory 3040 includes a telcom handler 3050 (discussed in more detail with reference to Figures 4 and 5) and a management processor (c 〇u ρ ο η management handler) 30 60 ( Refer to Figures 4 and 6 for a more detailed discussion.) A coupon response handler 3 0 7 0 (discussed in more detail in Figures 4 and 7), a token database 3 080, a switch A handler (pbx handler) 3090, and a notification handle Is 3 1 0 0. Support Product Library 3 〇 8 0 product examples include but are not limited to IBM's database server products sold under the trademark DB/2. As will be appreciated by those skilled in the art, the signature database 3080 can be executed at another remote network connection node and accessed via the data network 2 560 (a c c e s s ). The product example supporting the switch processor 30 90 includes the product sold by Intei under the product name me DL-3002, including its support software. Product Examples for Support Notification Processor 3100 include, but are not limited to, Lotus products under the trademark Sametimd/.
圖四例示符記伺服器2580實施的邏輯流程。如圖所 示,步驟4000中,伺服器2580等待輸入。當认定輸入 步驟4010檢查輸入的型態。而若其關於電話(例如, 一使用者250 0來的嘗試’要與第二使用者251〇通話), 於步驟4020電信處置器3050被喚起,接著繼續到步驟 400 0。若輸入與電話無關,則於步驟4〇3〇決定是否 ΪΓΐ (I例如從第一使用者的數據網路節點2520來的ΐ 產生或刪除—符記)。若是,則於步驟4040喚起符記管Figure 4 illustrates the logic flow implemented by the token server 2580. As shown, in step 4000, server 2580 waits for an input. When the input is determined, step 4010 checks the type of the input. And if it is to talk to the second user 251 about the phone (e.g., a user's 250' attempt), the telecommunications handler 3050 is invoked in step 4020, and then proceeds to step 4000. If the input is not related to the phone, then in step 4〇3, it is determined whether or not I (I is generated or deleted, for example, from the first user's data network node 2520). If yes, then in step 4040, the token is called.
第20頁 1299454 五、發明說明(14) 一 處置為3 0 60,接著繼續到步驟40 0 0。若步驟4 0 30的檢查為 Z ’則於步驟4〇5〇中決定此輸入是否關於對一符記的一回 4;(例如第:使用者接受符記的要求)。若是,則步驟 # 60中喚起符記回應處置器3070,接著繼續到步驟4〇〇〇。 若輸入與回應無關,則步驟4070中決定此輸入是否對符記 的要求^例如第二使用者251 0的一要求,要關於他們自己 的所1付記’當第二使用者2 5 1 0啟用他們的數據網路節點 2 5 4 0 %•可能發生的一要求)。若此輸入是對符記的要求, 則步驟Μ 90喚起符記管理處置器30 60,接著繼續到步驟 若此輸入非一符記檢索要求(coupon retrieval request ),則於步驟4〇8〇中喚起一雜項處置器 (\iscel laneous handler )(本發明範疇以外), 繼續到步驟4〇〇〇。 接者 圖五 施的邏輯 2570 ,以 中,電信 交換機控 域中的電 30 90,以 嘗試是否 記管理處 示失能所 例示根據本發明 流程,其容許符 產生和更新通訊 處置器3050檢查 制域中的電話的 話的來電,則於 嘗試和建立要求 成功,而若通道 置器3 0 6 0,傳遞 有與此號碼有關 第一實施例, 記伺服器2 5 8 0 能力符記。如 給定電話事件 來電。若此事 步驟5 〇 1 〇中, 的通訊通道。 被產生,則於 内部電話網路 的符記。這是 電信處置 監視電話 圖所示, (event〕 件是從交 呼叫交換 步驟5020 步驟5 0 4 5 節點的號 為了避免 器3050實 網路 步驟5 0 〇 〇 >是否從 換機控制 機處置器 中檢查此 中喚起符 碼,並指 對現在忙Page 20 1299454 V. INSTRUCTIONS (14) A Disposition is 3 0 60, and then proceeds to step 40 0 0. If the check of step 4 0 30 is Z ′ then it is determined in step 4〇5〇 whether the input is related to a return 4; (for example, the user accepts the request). If so, the caller responds to the handler 3070 in step #60 and proceeds to step 4〇〇〇. If the input is unrelated to the response, then in step 4070 it is determined whether the input requires a token, such as a request by the second user 251 0, to be enabled with respect to their own 1 'when the second user 2 5 1 0 is enabled Their data network node 2 5 4 0% • a requirement that may occur). If the input is a request for the token, then step 唤 90 invokes the token management handler 30 60, and then proceeds to the step if the input of the coupon retrieval request (coupon retrieval request) is then performed in step 4〇8〇 Arouse a miscellaneous handler (\iscel laneous handler) (outside the scope of the invention) and proceed to step 4〇〇〇. The logic 2570 of Figure 5 is used to control the power failure in the domain of the telecommunications switch to try to indicate whether or not the management is disabled. The flow according to the present invention is allowed to generate and update the communication handler 3050. The incoming call of the telephone in the domain is successful in the attempt and setup request, and if the channel is set to 3 0 6 0, the first embodiment is associated with this number, and the server 2 5 8 0 capability token is recorded. Calls like a given phone event. If this is the case, step 5 〇 1 ,, the communication channel. Generated, then the internal telephone network's token. This is shown in the telecom disposal monitoring phone map. The event is from the call exchange step 5020. Step 5 0 4 5 Node number to avoid the device 3050 real network step 5 0 〇〇> Whether to dispose of from the change control machine Check this in the caller code and refer to the busy now
1299454 五、發明說明(15) "—~~ 碌的電話的無謂連線嘗試。接著,電信處置器3 〇 5 〇終止於 =驟5040。若連線嘗試失敗,則於步驟5〇3〇中,喚起符記 官理處置器3 0 6 0以詢問傳送者是否要產生一通訊能力符 a己,初始者和目標兩者的電話號碼在這次喚起中傳遞,而 右他們接受,產生對應符記。接著處置器流程終止於步驟 5040。若此事件非來自内部電話節點的來電,則於步驟 5 0 5 0中,電信處置器3 〇 5 〇決定此電話事件是否係對於具有 相關付纪的内部電話節點之來電,即已授與符記給某其他 $用f的使用者電話號碼。若是,則於步驟5〇6〇中,喚起 符$己官理處置器3 〇 6 0,傳遞内部電話網路節點的號碼,並 才曰示所有與此號碼有關的符記失能。再次說明,這是為了 避免對現在忙碌的電話無謂連線嘗試。步驟5 〇 6 〇後,喚起 父換機處置器3090以完成此通電話,之後電信處置器3〇5〇 終止於步驟5 0 4 0。熟此技藝者應可理解,即使使用給定電 活’右給定必須進入接通(access )的權限與,額外來電 也可插入通道中,例如由電信公司提供的「來電等待」電 洁功能、或是緊急狀況下警方之行為。既然符記伺服器負 責全部的電話通訊通道,本發明容許當第二使用者使用他 們的符記時’插入現有電話的通訊通道。此侵入級中斷 (intrusion-level interrupt)功能可為指定於給定符 記中的另一數據攔位。此外,如參照將於圖十七所詳細敘 述的’給定服務提供者可為具有和使用此功能的符記收更 多費用。1299454 V. Invention Description (15) "-~~ The unnecessary connection attempt of the phone. Next, the telecommunications handler 3 〇 5 〇 terminates at = step 5040. If the connection attempt fails, in step 5〇3〇, the operator handler 3 0 6 0 is called to ask the transmitter whether to generate a communication capability a, the phone numbers of both the initiator and the target are This time the arousal is passed, and the right they accept, producing the corresponding token. The handler process then ends at step 5040. If the event is not an incoming call from the internal telephone node, then in step 5 0 50, the telecommunications handler 3 〇 5 〇 determines whether the telephone event is an incoming call to an internal telephone node having an associated payment, ie, a grant Record it to some other user's phone number with $. If so, in step 5〇6〇, the caller's authority handler 3 〇 60 is sent, the number of the internal telephone network node is passed, and all the tokens related to the number are disabled. Again, this is to avoid unnecessary connection attempts to busy calls. After step 5 〇 6 ,, the parent swap handler 3090 is invoked to complete the call, after which the telecom handler 3〇5〇 terminates at step 5 0 4 0. It should be understood by those skilled in the art that even if a given power activity is used, the right button must be allowed to access, and additional calls can be inserted into the channel, such as the "call waiting" power supply function provided by the telecommunications company. Or the police's actions in an emergency. Since the token server is responsible for all telephone communication channels, the present invention allows the communication channel of an existing telephone to be inserted when the second user uses their tokens. This intrusion-level interrupt function can be another data block assigned to a given token. In addition, a given service provider may charge more for a token having and using this function as described in detail with reference to Figure 17.
第22頁 1299454Page 22 1299454
步驟5 0 8 0檢查決 打給關於現有符 喚起符記管理處 相關的符記。步 行來電完成(若 。若步驟5080的 置器30 90,接著 回到圖五,若步驟5 0 5 0的檢查為否, 定此電話事件是否一來電完成,此來電係 記的電話號碼。若是,則於步驟5〇9〇中, 置器3 0 6 0 ’傳遞電話號碼並告知致能所有 驟5090之後,呼叫交換機處置器3〇9〇來實 必要)’之後處置器3050終止於步驟5〇4〇 檢查為否,則於步驟50 70申喚起交換機處 處置器3050終止於步驟5〇40。 明第一實施例,符記 其處置管理能力符|己 如圖所示,步驟6000 產生。若是,則於步 明)’使通話初始者 )其想產生之符記。 是,則於步驟6 〇 2 〇中 的數據。這樣的數據 話號碼、以及給目標 者識別(ID )。在較 用者的Samet ime識別 不限於:一使用者識 為,符記伺服器2 5 8 0 向目標使用者,且符 之要求抵達而指明一 管理處置器 的產生、刪 檢查目前處置 驟6010中(若 (例如使用者 若否,則處置 ,處置器30 60 包含但不限於 使用者(例如 佳實施例中, ,但本發明也 別/密碼對。 用它來經由通 記要求藉以決 特定使用者識 圖六例示根據本發 3 0 6 0實施之邏輯流程, 除、狀態修改和檢索。 器要求是否要求符記的 於處置器3060要求中指 1 2500)驗證(verify 器終止於步驟6 0 60。若 檢索產生符記所有需要 通話初始者和目標的電 使用者2 25 1 0 )的使用 此使用者識別是目標使 支援其他形式,包含但 此使用者識別的重要性 知處置器31 00將通知引 定相關符記(例如符記Step 5 0 8 0 Check the call to the relevant character of the call to the management office. The pedestrian call is completed (if. If the device 30 90 of step 5080, then return to Figure 5, if the check of step 5 0 50 is no, determine whether the call event is completed, the phone number of the call is recorded. Then, in step 5〇9〇, the device 3 0 6 0 'passes the phone number and informs that after all the steps 5090 are enabled, the call switch handler 3〇9〇 is necessary)) after the processor 3050 terminates in step 5 If the check is no, then at step 50 70, the switch at the switch handler 3050 terminates at step 5〇40. The first embodiment, with its handling management capability, has been generated as shown in the figure 6000. If so, then in the step), the call originator is asked to generate the token. Yes, then the data in step 6 〇 2 〇. Such a data number and an identification (ID) for the target. In the user's Samee ime identification is not limited to: a user recognizes, the token server 2 580 to the target user, and the request for arrival indicates that a management processor is generated, deleted, and the current processing step 6010 If (if the user does not, then dispose of, the processor 30 60 includes but is not limited to the user (for example, in the preferred embodiment, but the invention is also different / password pair. It is used to pass the specific requirements The user exemplifies six examples of the logic flow according to the implementation of the method of the present invention, the state modification and the retrieval. The device requires the processor 3060 to request the middle finger 1 2500) to verify (the verifier terminates at step 60). 60. If the search generates all the electric users who need to call the initiator and the target 2 25 1 0), the user identification is the target to support other forms, including the importance of the user identification processor 31 00 Will be notified to the relevant token (for example, the token
第23頁 1299454 五、發明說明(17) :;H那個使用者識別的所有符記接收者將被回 傳)。步驟603 0中,為认定眘邙姦4 t ^ ^ ^ 馮、,·口疋貝成產生一符記物件,此物件 不限於· JaVa類的實例、或類似物件構成 i:r:uet)。步驟6G4G中’儲存符記物件於符記資料 =:’而步驟605。中,傳送符記存在的—通知給目標 使:者(例如使用者2 25 1 〇 )。較佳實施例中通 知处置器3100,#Sametime訊息傳送此通知。訊自 一肌,當此飢被檢索,會提供檢索者可用來運 ㈣UPplet)。步驟6050之後,處置器議終止 :二T060 :其他情形下’若步驟607"的檢查決定處置 裔斤〇要求係要求符記刪除,則於步驟6080中,識別出相 Z符記,並將之自符記資料庫3080刪除,接著處置器30 60 終止於步驟6060。假如相反地,於步驟6090決定處置器 3 〇 6 〇要求是要失能一或多個符記,則於步驟6 1 0 〇中,識別 出所有相關符記,於步驟6 11 0中,在符記資料庫3 〇 8 〇將每 们這些付記標示為已失能,接著處置器3 0 6 0終止於步驟 606j。另外,若步驟6120中的檢查決定管理處置器3〇6〇要 求是要致能一或多個符記,則於步驟613〇中,識別出所有 $,符記,於步驟6 140中,在符記資料庫3〇8〇將每一個這 些符記標示為已致能,接著處置器3060終止於步驟6 06〇。 步驟6 150中,若決定符記管理處置器3 0 6 〇要求並非檢 索一或多個符記的要求,則處置器3 0 6 0終止於步驟60 6〇。 否則’於步驟6 1 60中,識別所有相關符記,之後於步驟Page 23 1299454 V. INSTRUCTIONS (17) :;H All recipients identified by the user will be returned). In step 603 0, in order to determine that the traitor is 4 t ^ ^ ^ von, the 疋 疋 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生 产生In step 6G4G, 'store the token object in the token data =:' and step 605. In the middle, the transmission token exists - the notification is given to the target: (for example, user 2 25 1 〇 ). In the preferred embodiment, the handler 3100 is notified, and the #Sametime message transmits this notification. From a muscle, when this hunger is retrieved, it will be provided by the searcher (IV) UPplet). After step 6050, the handler is terminated: two T060: In other cases, if the check of step 607" determines that the request is to be deleted, then in step 6080, the phase Z symbol is identified and The deletion is completed from the token database 3080, and then the handler 30 60 terminates at step 6060. If, conversely, it is determined in step 6090 that the processor 3 〇6 〇 request is to disable one or more tokens, then in step 6 1 0 ,, all relevant tokens are identified, in step 6 11 0, in The token database 3 〇 8 标示 marks each of these tokens as disabled, and then the handler 3 0 60 terminates at step 606j. In addition, if the check in step 6120 determines that the management handler 3〇6 is required to enable one or more tokens, then in step 613, all $, tokens are identified, in step 6140, The token database 3〇8 marks each of these tokens as enabled, and then the handler 3060 terminates at step 6 06〇. In step 6150, if it is determined that the token management handler 3 0 6 〇 requires not to retrieve one or more tokens, the handler 3 0 6 0 terminates at step 60 6〇. Otherwise, in step 6 1 60, all relevant tokens are identified, followed by steps
1299454 五、發明說明(18) 6 1 7 0 =,產生一網頁,包含針對每一匹配符記的小應用程 式,母一個這些小應用程式容許網頁之接收者運用對應符 。己。步驟6 1 8 0中,此網頁被回傳給要求者,接著處置器終 止於步驟6 0 6 0。熟此技藝者可理解,回應使用者(例如使 用,2 25 1 〇 )看到的符記小應用程式可顯示—給定符記的 致能對失能狀態。此容許他們只在符記(因此還有對應電 話通道)可用時運用一給定符記。 一 圖七例不根據本發明第一實施例,符記回應處置器 —070實施的邏輯流程。步驟7000中,檢查已接收要求,且 1决疋此要求係來自接受一符記為基礎之通訊要求的使用 ,則於步驟7010中,處置器3070首先喚起交換機處置器 3 9 ,以在電話網路257〇中產生一通訊通道至符記傳送者 牛二二使用者1 2500 )的電話網路節點2530 (圖二)。在 ^ ,決定產生通道至使用者1的嘗試是否成功,若 =功,於#驟7030傳送失敗通知給回應使用例如使 蓺者可H 著處置器3G7G終止於步驟難。熟此技 ’回應使用者稍後可再次嘗試與運用符記。若 二:^,麵",處置器3〇?〇喚起 0,以在電話網路257〇中產生一通訊通道 網路節點255G (圖二)。步驟觸檢查此嘗試, 失敗通次2道至使用者2的嘗試不成功,於步驟703 0傳送 ^ 251〇) 、、止於步驟7040。若步驟7〇6〇決定產生建立嘗試成 12994541299454 V. INSTRUCTIONS (18) 6 1 7 0 =, generating a web page containing a small application for each matching token, one of these applets allows the recipient of the web page to use the corresponding character. already. In step 6 1 0 0, the web page is returned to the requester, and then the handler terminates at step 6 0 60. It will be understood by those skilled in the art that the responding applet that is seen in response to the user (e.g., 2, 25 1 〇) can be displayed - the enable state of the given token is disabled. This allows them to apply a given token only when the token (and therefore the corresponding telephone channel) is available. A seventh embodiment of the present invention is not in accordance with the first embodiment of the present invention, and the logic flow of the response processor 070 is implemented. In step 7000, the received request is checked, and 1 is determined to be from the use of a call-based communication request. In step 7010, the handler 3070 first invokes the switch handler 39 for the telephone network. In 257, a communication channel is generated to the telephone network node 2530 (Fig. 2) of the token carrier. At ^, it is determined whether the attempt to generate the channel to user 1 is successful, if = work, in step #3030, the transmission failure notification is sent to the response using, for example, the latter can be terminated by the processor 3G7G. Responsible for this technique 'Respond to the user can try and use the token again later. If two: ^, face ", the handler 3〇?〇 evokes 0 to generate a communication channel network node 255G in the telephone network 257〇 (Fig. 2). The step is to check the attempt, and the attempt to fail the second pass to the user 2 is unsuccessful. In step 703 0, the transfer is 251 〇), and the process ends at step 7040. If step 7〇6〇 decides to generate an attempt to become 1299454
功,則於步驟70 70,處置器3070將這兩個新產生建立的套 接連結或會談(conference )。於步驟7080,處置器3〇7〇 將符記的再試(retry )計數(若有的話)遞減,接著於 步驟7090檢查是否還有再試(retries)。若沒有可用再 試,處置器3070終止於步驟7040。否則,若還有可用再 試,於步驟71 00中,處置器30 70喚起符記管理處置器3〇6〇 來刪除目前的符記,接著處置器3 〇 7 〇終止於步驟7 〇 4 〇。In step 70 70, the handler 3070 links or converces the two newly created sockets. At step 7080, the handler 3 〇 7 递 decrements the retry count (if any) of the token, and then checks in step 7090 if there are still retries. If no retry is available, the handler 3070 terminates at step 7040. Otherwise, if there is still a retry available, in step 71 00, the handler 30 70 evokes the token management handler 3〇6〇 to delete the current token, and then the handler 3 〇 7 〇 terminates in step 7 〇 4 〇.
、於步驟7110,進一步決定回應是否拒絕符記的通訊要 求,若是,於步驟7 100中,喚起符記管理處置器3〇6〇來刪 除目前的符記,接著處置器3070終止於步驟7〇4〇。假如此 回應亦非對符記的拒絕(如步驟7丨丨〇所決定),處置器 3070終止於步驟7040。熟此技藝者應理解,拒絕的回應可 包含一註解’可能指出為何拒絕此符記。熟此技藝者也應 理解’符記回應處置器3 〇 7 〇可將此拒絕註解顯示給初始使 用者(例如使用者1 2 5 0 0 )。熟此技藝者也應理解,符記 回應處置器3070更可處置其他型態的回應,包含但不限 於:給初始使用者的一訊息,指出何時回應者會接受符 記,例如「五分鐘内我會和你談話 。 ^ 圖八描繪數據網路節點2 5 2 0和2 5 4 0的更詳細範例,藉 著匕們’使用者1 25 0 0和使用者2 25 1 0分別實行數據網路 為基礎的通訊’此通訊包含但不限於跟符記伺服器2 5 8 〇的 通汛。如圖八所示,每一節點8〇〇〇較佳包含一CPU 8〇 1 〇、In step 7110, it is further determined whether the response rejects the communication request of the token, and if so, in step 7100, the token management handler 3唤6〇 is invoked to delete the current token, and then the handler 3070 terminates in step 7〇. 4〇. If the response is not a rejection of the token (as determined in step 7), the handler 3070 terminates at step 7040. Those skilled in the art should understand that a refusal response may include a comment ‘may indicate why the token is rejected. Those skilled in the art should also understand that the token response handler 3 〇 7 〇 can display this rejection annotation to the initial user (e.g., user 1 2 5 0 0 ). Those skilled in the art should also understand that the token response handler 3070 can handle other types of responses, including but not limited to: a message to the initial user indicating when the responder will accept the token, such as "in five minutes. I will talk to you. ^ Figure 8 depicts a more detailed example of the data network nodes 2 5 2 0 and 2 5 4 0, by means of the 'user 1 25 0 0 and the user 2 25 1 0 respectively. Road-based communication 'This communication includes but is not limited to the same as the communication server 2 5 8 汛. As shown in Figure 8, each node 8〇〇〇 preferably contains a CPU 8〇1 〇,
第26頁 1299454 五、發明說明(20) 一儲存裝置8020 (例如一碟或直接存取儲存裝置direct access storage device,DASD); —數據網路介面 80 3 0、一記憶體8040 (例如隨機存取記憶體RAM )、一 HTTP客端處置器8050、以及一客端通知處置器8〇6〇。根據 本發明,數據網路節點的邏輯(將參照圖九有詳細討論) 較佳被實施為電腦可執行碼。此電腦可執行碼從遠端(例 如從數據網路2560經數據網路介面803〇)、或從本地永久 光學(例如CD-ROM )或磁儲存裝置(例如碟或直接存取儲 存裝置80 20 )下載至記憶體8〇4〇,供CPU 8010執行。數據 網路2 5 6 0與節點8 0 0 0來回的通訊係經由網路介面8 〇 3 〇,通 訊型態包含但不限於乙太網路、訊標環、和無線方式(例 如射頻和以紅外線為基礎的)。 圖九例示了在每 的邏輯流程。如圖所 狀態,以等待輸入。 的型態,若其為HTTP 或從一HTTP伺服器來 客端處置器8050,接 相關,步驟903 0檢查 符記伺服器的通知處 9040中喚起通知處置 輸入非通知相關,於 本發明範疇),接著 一個數據 示,於步 只要接收 相關(例 的回應) 著繼續到 輸入以決 置器3 1 0 〇 器8060 , 步驟90 50 繼續到步 網路節點2520 驟9〇〇〇中,節 到輸入,步驟 如要求使用者 ’則步驟9 0 2 0 步驟9 0 0 0。若 疋其是否通知 送來的通知) 接著繼續到步 和 2 5 3 0 點被置 9010 檢 要求一 中,喚 此輸入 相關( 。若是 驟 9 0 0 0 中喚起一雜項處置器 驟9〇〇〇 〇 上實施 於等待 查輸入 網頁, 起 HTTP 非 HTTP 例如從 ,步驟 。若此 (超過Page 26 1299454 V. Description of the Invention (20) A storage device 8020 (for example, a disk or direct access storage device (DASD); - a data network interface 80 3 0, a memory 8040 (eg, random storage) Take the memory RAM), an HTTP client handler 8050, and a client notification handler 8〇6〇. In accordance with the present invention, the logic of the data network node (which will be discussed in detail with reference to Figure 9) is preferably implemented as a computer executable code. The computer executable code is remotely (eg, from data network 2560 via data network interface 803), or from a local permanent optical (eg, CD-ROM) or magnetic storage device (eg, a disc or direct access storage device 80 20 ) Download to memory 8〇4〇 for CPU 8010 to execute. The data network 2 5 6 0 and the node 800 0 back and forth communication via the network interface 8 〇 3 〇, the communication type includes but is not limited to Ethernet, signal ring, and wireless mode (such as RF and Infrared based). Figure 9 illustrates the logic flow at each. As shown in the figure, wait for input. The type, if it is HTTP or from an HTTP server to the client handler 8050, the correlation is determined, step 903 0 checks the notification server 9040 in the notification server to evoke the notification processing input non-notification related, in the scope of the present invention, Next, a data is displayed, as long as the receiving step (receives the response) continues to the input to the determiner 3 1 0 device 8060, the step 90 50 continues to the step network node 2520, and the input is entered. If the step requires the user' then step 9 0 2 0 step 9 0 0 0. If it is not notified of the notification sent) Then continue to step and 2 5 3 0 is set to 9010 check request one, call this input related (. If it is a 9 0 0 0 call a miscellaneous handler step 9〇〇 〇〇 Implemented on the web page waiting to be checked, starting from HTTP non-HTTP, such as from, step. If this (more than
1299454 五、發明說明 現參照圖八至十六詳細描述本發明第二實施例。此第 二實施例給定使用者監視他們自己的電話通訊,且處 置相關的通訊能力符記的產生、刪除、和修改,而非第一 實施例中使用的中間符記伺服器25 80。消去符記伺服哭 2580更意味給定使用者可利用本發明,無須使用客製化中 央處置器(例如交換機)控制的電話。例如若一區域電話 公司(例如Verizon )提供數據網路相關服務,他們可以 提供類似符s己伺服器2 5 8 0的服務’無須特別客製化本地交 換機。 圖Η 描繪第二較佳實施例的網路拓撲範例。如所 示,有第一使用者1 1 000和第二使用者1101〇,分別為使用 者1和使用者2 ’使用者1 11000具有連線至數據網路1105Q 和電話網路1 1 0 60兩者的單一裝置1 1〇2〇 ;而使用者2 11 〇 1 〇具有連線至數據網路1 1 0 5的數據網路節點丨丨0 3 〇、和 連線至電話網路1 1 060的電話網路節點Η 040兩者。還有通 知飼服器11 〇 7 0連線至數據網路1 1 〇 5 0。數據網路1 1 〇 5 0的 範例包含但不限於:網際網路與私用内部網路。電話網路 1 1 0 6 0的範例包含但不限於:標準電話網路,進接 (access) Verizon、AT&T與類似業者所提供者。數據網 路節點1 1 0 3 0 (參照圖八與圖九詳細描述)可包含但不限 於··執行Windows 95以及例如微軟Internet Explore的網 頁瀏覽器的IBM ThinkPad,或是執行MacOS 8. 5. 6以及如1299454 V. DESCRIPTION OF THE INVENTION A second embodiment of the present invention will now be described in detail with reference to Figs. This second embodiment allows the user to monitor their own telephone communication and to process the generation, deletion, and modification of the associated communication capability tokens, rather than the intermediate token server 25 80 used in the first embodiment. Eliminating the Message Serving Cry 2580 means that a given user can utilize the present invention without the need for a telephone controlled by a custom central processor (e.g., a switch). For example, if a regional telephone company (such as Verizon) provides data network related services, they can provide services similar to the server's 2,580. No need to specialize the local exchange. Figure 2 depicts an example of a network topology of a second preferred embodiment. As shown, there are first user 1 1 000 and second user 1101 〇, respectively user 1 and user 2 'user 1 11000 has connection to data network 1105Q and telephone network 1 1 0 60 The single device of the two is 1〇2〇; and the user 2 11 〇1 〇 has the data network node 丨丨0 3 连 wired to the data network 1 1 5 5, and connected to the telephone network 1 1 060's telephone network node Η 040 both. There is also a notification that the feeder 11 〇 70 is connected to the data network 1 1 〇 5 0. Examples of data networks 1 1 〇 5 0 include, but are not limited to, the Internet and private intranets. Examples of telephone networks 1 1 0 6 0 include, but are not limited to, standard telephone networks, access to Verizon, AT&T, and similar providers. The data network node 1 1 0 3 0 (described in detail with reference to FIG. 8 and FIG. 9) may include, but is not limited to, an IBM ThinkPad that executes Windows 95 and a web browser such as Microsoft Internet Explore, or executes MacOS 8. 6 and as
第28頁 1299454Page 28 1299454
網景Navigator的網頁瀏覽器的Apple,s p〇wer Macintosh。數據網路節點也可包含可連網路的行動(例 如可攜式)裝置,如IBM以商標WordPad銷售的裝置。數搪 網路節點,亦可包含智慧Μ式電話(例&可作為蜂巢式= 話,也可執行網頁瀏覽器之類的網路應用程式的裝置), 例如Nokia以商標Nokia 90 0 0 i銷售的蜂巢式電話。電話 ,節點1 1 040可包含任何可支援經由電話網路257〇通訊的 裝置,包含例如VeriZ0n銷售的標準電話,以及N〇kia# 標Nokia 90 00 i銷售的行動電話。 同 如同—第一實施例,雖然所示使用者! 11〇〇〇和使用者2 11 0 1 0之每一只有單一數據網路節點與電話網路節點,本 發明可支援使用者使用超過一個。而且,雖然所示只有 個使用者,本發明可支援超過兩個。裝置11〇2〇的範例A (參照圖十二至十六有詳細描述)包含任何可經數據通 與電話網路兩者通訊的裝置,這樣的裝置包含但不限於° Nokia以商標Nokia 9〇〇〇i銷售的產品。熟此技藝者應可理 解:使用者2 11010的裝置對1 1 03 0和11〇4〇可為類似^單 一裝$。此外,通知伺服器1丨0 70可包含可作為客端通知 處置器8 0 6 0和1 2 0 9 0之通訊伺服器的任何運算節點,分別 >圖八與圖十二有更詳細描述。此包含但不限於:執行 微,以商標Wind〇ws NT銷售的作業系統與伺服器應用程$ 套裝軟體、本受讓人Internati〇nal BusinessNetscape Navigator's web browser for Apple, s p〇wer Macintosh. Data network nodes may also include network-enabled mobile (e.g., portable) devices, such as those sold by IBM under the trademark WordPad. The number of network nodes can also include smart phone (example & can be used as a cellular type, or a web application such as a web browser), such as Nokia under the trademark Nokia 90 0 0 i Honeycomb phone for sale. The telephone, node 1 1 040 may comprise any device that supports communication over the telephone network 257, including, for example, a standard telephone sold by VeriZ0n, and a mobile telephone sold by N〇kia# under Nokia 90 00 i. Same as - the first embodiment, although the user is shown! Each of the 11 〇〇〇 and the user 2 11 0 1 0 has only a single data network node and a telephone network node, and the present invention can support more than one user. Moreover, although only one user is shown, the present invention can support more than two. Example A of the device 11 (described in detail in Figures 12 through 16) contains any device that can communicate with both the data communication and the telephone network. Such devices include, but are not limited to, Nokia under the trademark Nokia 9〇 〇〇i products sold. Those skilled in the art should understand that the device pair 11010 and 11〇4 of the user 2 11010 can be similar to a single $. In addition, the notification server 101 can include any computing node that can serve as a communication server for the client notification handlers 8 0 6 0 and 1 2 0 0 0, respectively, as described in more detail in FIG. 8 and FIG. . This includes but is not limited to: Execution Micro, operating system and server application sold under the trademark Wind〇ws NT $ package software, this assignee Internati〇nal Business
Inc· ( IBM )以商標powerpc銷售的產品。此節點也可執行 1299454 發明說明(23) 傳訊伺服器應用程式,包含但不限於Lotus以商標 Sametime銷售的產品。 圖十例不根據本發明第一實施例之流程的概觀。步 1 0000中,第一使用者(使用者i 11〇〇〇)要求與第二使= 者(使用者2 11G1G )通電話。步驟⑽1G中,決定此通气 嘗試是否成功。若成功,此流程終止於步驟1〇〇9〇。否° 則,若此通訊嘗試不成功,則於步驟1〇〇2〇中,詢問初始 使用者1 1 000是否要產生關於此要求的通訊能力符記。 使用者1 1 000不要產生符記,此流程終止於步驟1 009〇。否 則,於步驟1 0030中,產生關於此失敗要求的一符記否 ,於步驟1〇〇4〇中,傳送一通知給第二使用者11〇1〇,通知 一一使用者11 0 1 0符記的存在。步驟丨〇 〇 5 〇中流程等待 用fumo回應’且於步驟1〇〇6〇中,在收到此回應時 欢一。右回應為接受,則於步驟1〇〇7〇中建立此通電話。 ^論第二使用者11010接不接受,假如必要的話在步驟 1 0080刪除符記,接著此流程终止於步驟1〇〇9〇。如前參照 圖七所述,一給定符記可能使用多次。因此在某些情況 下,例如此符記仍容許第二使用者11010額外喚起(例如 =它剩下的計數值大於〇 ),、給定符記不會 驟1〇 被刪除。 圖十二為一方塊圖,描繪使用者J 1 1 000的數據和電 活網路裝置11020,此裝置11 020容許使用者! 1 1 0 0 0要求 1299454 五、發明說明(24) 與接收數據為基礎的網路1 1 〇 5 〇通訊和電話為基礎的網路 11060通訊兩者。此裝置11020較佳包含一 cpu 12000、~ 儲存裝置12010 (例如一碟或直接存取儲存裝置);—數 據網路介面1 20 20、一電話網路介面12〇3〇、以及記憶體 1。2040 (例如隨機存取記憶體)。根據本發明,此裝置邏 輯(將參照圖十三詳細討論)較佳被實施為電腦可執行 碼。此電腦可執行碼從遠端(例如從數據網路丨丨〇 5 〇經數 據網路介面1 2020 )、或從本地永久光學(⑶―R〇M)或磁 儲存裝置(例如碟或直接存取儲存裝置12〇1〇 )下載至纪 憶體1 2040,供CPU 1 2000執行。數據網路11〇5〇與伺服器 來回的通訊係經由數據網路介面12〇2〇,通訊型態包含但 不限於有線和無線方式(例如射頻為基礎的)。電話網路 1 1 0 60通訊,包含裝置11〇2〇和11〇4〇之間的,都經由電 網路介面1 2030管理。記憶體1 204〇較佳包含一電信處 1 20 50 (參照圖十三和十四會有更詳細討論)、一符° 理處置器1 2060 (參照圖十三和十五會有更詳細討論\ : 一符記回應處置器12〇7〇 (參照圖十三和十六會有更詳细 讨淪)、一符記資料庫1 2080、一通知處置器12〇9()、 電活通吼處置态1 21 〇 〇。支援符記資料庫丨2 〇 8 〇的應用程 於t Ϊ藝中為熟知’而包含例如但不限於以c或Java寫的" 客衣貪料庫應用程式。熟此技藝者可理解,#記資料庫、 可於另一遠端網路連接節點執行,並經數據網路 ι」ο 〇進^妾(access)。支援電話通訊處置器121〇〇的 範例包含N〇kla銷售的產品N〇ku 9〇〇〇的電話通訊 ^Inc. (IBM) products sold under the trademark powerpc. This node is also executable. 1299454 Invention Description (23) The messaging server application, including but not limited to products sold by Lotus under the trademark Sametime. Figure 10 is an overview of a flow not according to the first embodiment of the present invention. In step 1 0000, the first user (user i 11〇〇〇) requests to make a call with the second enabler (user 2 11G1G). In step (10) 1G, it is determined whether the ventilation attempt is successful. If successful, the process ends in steps 1〇〇9〇. If no, if this communication attempt is unsuccessful, in step 1〇〇2〇, ask the initial user 1 1 000 whether to generate the communication capability token for this requirement. User 1 1 000 does not generate a token, and the process ends in step 1 009. Otherwise, in step 1030, a token for the failure request is generated. In step 1〇〇4, a notification is sent to the second user 11〇1〇 to notify the user 11 0 1 0 The existence of the token. Step 丨〇 〇 5 流程 Process waits with fumo response' and in step 1〇〇6〇, when you receive this response, you will be happy. If the right response is accepted, then the call is established in step 1〇〇7〇. The second user 11010 does not accept, if necessary, deletes the token in step 1080, and then the flow terminates in steps 1〇〇9〇. As mentioned above with reference to Figure 7, a given token may be used multiple times. Therefore, in some cases, for example, the token still allows the second user 11010 to additionally evoke (e.g., the remaining count value is greater than 〇), and the given token will not be deleted. Figure 12 is a block diagram depicting the user J 1 1 000 data and the electrical network device 11020, which allows the user! 1 1 0 0 0 Requirements 1299454 V. Description of the invention (24) Network with receiving data 1 1 〇 5 〇 Communication and telephone-based network 11060 communication. The device 11020 preferably includes a CPU 12000, a storage device 12010 (eg, a disk or direct access storage device); a data network interface 1 20 20, a telephone network interface 12〇3〇, and a memory 1. 2040 (eg random access memory). In accordance with the present invention, this device logic (discussed in detail with reference to Figure 13) is preferably implemented as a computer executable code. The computer executable code is remotely (eg, from the data network 丨丨〇5 via the data network interface 1 2020), or from local permanent optics ((3)-R〇M) or magnetic storage devices (eg, disc or direct storage) The storage device 12〇1〇) is downloaded to the memory unit 1 2040 for execution by the CPU 12000. The data network 11〇5〇 communication with the server is via the data network interface 12〇2〇, and the communication type includes but is not limited to wired and wireless (such as radio frequency based). The telephone network 1 1 0 60 communication, including devices 11〇2〇 and 11〇4〇, is managed via the electrical network interface 1 2030. The memory 1 204 〇 preferably includes a telecommunications office 1 20 50 (discussed in more detail with reference to Figures 13 and 14), and a processor 1 2060 (see Figures 13 and 15 for a more detailed discussion). \ : A token response processor 12〇7〇 (refer to Figure 13 and 16 for more detailed discussion), a token database 1 2080, a notification handler 12〇9 (), electric activity吼 态 1 〇〇 〇〇 〇〇 〇〇 〇〇 〇〇 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援 支援It is understood by those skilled in the art that the #-repository can be executed at another remote network connection node and accessed via the data network. Supporting the telecom processor 121 The example includes the telephone communication of N〇ku 9〇〇〇 sold by N〇kla ^
12994541299454
系統。最後,支援通知處置器1 20 9 0的產品範例包含但不 限於Lotus以商標Same time銷售的產品。 圖十三例示數據網路節點11 02 0實施的邏輯流程。H 所示,步驟1 3000中,裝置1 1 020為等待狀態,等待輸入 二但接收到輸入,步驟13010檢查接收到的輸入的型態。 右其關於電話(例如從第一使用者丨丨000來的 ^(^用/^川通話厂則於步㈣⑽電信處置器、 1 2050被喚起,接著繼續到步驟13〇〇〇。若輸入system. Finally, examples of products that support the notification handler 1 209 include, but are not limited to, products that Lotus sells under the trademark Same time. Figure 13 illustrates the logic flow implemented by the data network node 110. As shown by H, in step 13000, device 1 1 020 is in a wait state, waiting for input 2 but receiving an input, and step 13010 checks the type of the received input. Right about the phone (for example, from the first user 丨丨000 ^ (^ with / ^chuan call factory in step (four) (10) telecom handler, 1 2050 is evoked, then continue to step 13 〇〇〇. If entered
話:則於步驟1 3030決定它是否牽涉符記管 如從 一使用者11刚來的要求,要產生或刪除—符記)。若接 收到的輸入牽涉符記管理,則於步驟13〇4〇喚起理 ί;Γ2:’牛接著繼續到步驟1 30 00。若步驟13〇3°〇二檢 查,否,則於步驟1 3050中決定此接收的輸入 :付=-回應(例如第二使用者接受符 、 二則步驟1 3060中喚起符記回應處置器12〇7〇,=: 到步驟1 3000。若步驟1 305〇的檢查者^、、·' : In step 1 3030, it is determined whether it involves a token such as a request from a user 11 to be generated or deleted - the token). If the received input involves the management of the token, then in step 13〇4〇, the 牛2:’ cattle then proceeds to step 1 30 00. If step 13〇3°〇2 checks, no, then the received input is determined in step 1 3050: pay=-response (eg, second user acceptor, second step 1 3060, call token response handler 12 〇7〇,=: Go to step 1 3000. If the checker of step 1 305〇 ^,··'
否對符記的要“例如第二== 要未,要關於他們自己的所有符記,當 ποιο啟用他們的數據網路節點11〇3〇時^ 匕=二是求,則步驟13。9〇喚起符記No, for the note, "For example, if the second == is not, you want to write about all of their own tokens. When ποιο enables their data network nodes 11〇3〇^ 匕=2 is the request, then step 13.9 Call up
入非:==,:者:續到步驟13°〇。,,若此I (超過= 步13°8°中喚起-雜項處置器 °么月靶可),接著繼續到步驟1 3 〇 〇 〇。Into::=,:: Continue to step 13°〇. , if this I (exceeded = step 13 ° 8 ° evoke - miscellaneous processor ° month target is available), then continue to step 1 3 〇 〇 〇.
第32頁 1299454 五、發明說明(26) 圖十四描纷根據本發明第二實施例,網路節點装置 U 020的電信處置器元件丨20 5 〇實施的邏輯流程,其容許裝 置1 1 020監視與使用者1 11 〇〇〇來回的電話網路通訊,以產 生和更新使用者1的通訊能力符記。如所示,步驟丨4 〇 〇 〇 中,處置器12050檢查給定電話事件是否從使用者1 11〇〇〇 · 來的來電。若是,則於步驟1 4 〇 1 〇中,呼叫電話通訊處置 器12100 ’以嘗試和建立要求的通訊通道。步驟14Q2Q中檢 查此嘗試是否成功,而若通道被產生,則於步驟丨4 〇 4 5中 喚起符記管理處置器1 2 0 6 0,傳遞内部電話網路節點的號 碼’並指示失能所有與此號碼有關的符記。這是為了避免 對現在忙碌的電話的無謂連線嘗試。接著,電信處置器 1 2 0 5 0終止於步驟1 4 〇 4 0。若連線嘗試失敗,則於步驟 1 40 30中,喚起符記管理處置器12〇 60以詢問使用者1 1 1 0 0 0是否要產生一通訊能力符記。若是,初始者和目標 兩者的電話號碼在這次喚起中傳遞,而若他們接受,產生 對應符記。接著處置器流程1 2 05〇終止於步驟1 4040。若接 收到的事件非來自使用者i i丨〇 〇 〇的來電,則於步驟丨4 〇 5 〇 中’電信處置器1 2050檢查此事件是否對使用者1 1 1 00 0的 _ 來電。若此事件是對使用者1 1 1 0 0 0的來電,則於步驟 1 4 0 6 0中’喚起符記管理處置器丨2 〇 6 〇,傳遞内部電話網路 節點的號碼,並指示失能所有與此號碼有關的符記。這是 為了避免對現在忙碌的電話的無謂連線嘗試。步驟1 4 0 6 0 後,於步驟14070喚起電話通訊處置器12100以完成此通電Page 32 1299454 V. Description of the Invention (26) FIG. 14 illustrates a logic flow implemented by a telecommunications handler component of a network node device U 020 according to a second embodiment of the present invention, which allows the device 1 1 020 Monitor the telephone network communication with the user 1 11 to generate and update the communication capability of the user 1. As shown, in step 〇4 〇 〇 ,, the handler 12050 checks if a given telephone event is an incoming call from the user 1 . If so, in step 1 4 〇 1 ,, the telephone communication handler 12100' is called to try and establish the required communication channel. In step 14Q2Q, it is checked whether the attempt is successful, and if the channel is generated, then in step 丨4 〇4 5, the token management handler 1 2 0 6 0 is sent, the number of the internal telephone network node is transmitted 'and the disable is all indicated. The token associated with this number. This is to avoid unnecessary connection attempts to busy calls. Next, the telecom handler 1 2 0 50 terminates at step 1 4 〇 4 0. If the connection attempt fails, in step 1 40 30, the token management handler 12 〇 60 is invoked to ask the user if the 1 1 1 0 0 0 0 is to generate a communication capability token. If so, the phone numbers of both the initiator and the target are passed in this arousal, and if they accept, the corresponding token is generated. The handler flow 1 2 05〇 then terminates at step 1 4040. If the received event is not from the user i i 丨〇 〇, then in step 〇4 〇 5 ’ 'telecom handler 1 2050 check if this event is a _ call to user 1 1 00 0 0. If the event is an incoming call to the user 1 1 1 0 0 0, then in step 1 4 0 0 0 'call the management processor 丨 2 〇 6 〇, pass the number of the internal telephone network node, and indicate the loss Can have all the tokens associated with this number. This is to avoid unnecessary connection attempts to busy calls. After step 1 4 0 6 0, the telephone communication processor 12100 is called up at step 14070 to complete the power-on.
第33頁 1299454 五、發明說明(27) 話,之後電信處置器12050終止於步驟14〇40。若步驟 1 4050的檢查為否,則步驟14〇8〇決定此電話事件是否對使 用者1 11000的來電之完成。若是,則於步驟14090中,唤 起符記管理處置器1 2 〇 6 0,傳遞電話號碼並告知致能所有 相關的付§己。步驟1 4 0 9 0之後,於步驟1 4 〇 7 0呼叫電話通訊 處置器12100來實行來電完成(若必要),之後處置器 1 4050終止於步驟1 4040。若步驟14 〇8〇的檢查為否,則於 步驟1 4070喚起電話通訊處置器121〇〇,接著處置器流程終 止於步驟1 4040。 圖十五為一流程圖,描繪本發明第二實施例,符記管 理處置器12060實施之邏輯,其處置管理能力符記的產 生、刪除、狀態修改和檢索。如所示,步驟1 5 〇 〇 〇首先檢 查以決定目前處置器要求是否要求符記的產生。若目前處 置器要求是要求符記的產生,則於步驟1 5 〇 1 〇中,(若於 處置器12060要求中指明)促使使用者1 iiooo驗證其的破 欲產生一符記。若否,則處置器1 2 0 60終止於步驟15〇6〇。 若使用者1想產生一符記,則於步驟15020,處置器12060 檢索產生符記所有需要的數據。這樣的數據包含但不限於 通話初始者和目標的電話號碼、以及給目標使用者(例如 使用者2 11 0 1 0 )的使用者識別(I D )。如第一實施例, 此使用者識別是目標使用者的Same t i me識別,但本發明也 支援其他形式,包含但不限於··一使用者識別/密碼X對。 接下來,於步驟1 5 0 3 0,為給定資訊產生一符記物件,此Page 33 1299454 V. INSTRUCTION DESCRIPTION (27) Then, the telecom handler 12050 terminates at step 14〇40. If the check in step 1 4050 is no, then step 14〇8〇 determines whether the call event is completed for the caller 1 11000. If so, then in step 14090, the token management handler 1 2 〇 60 is invoked, the telephone number is communicated and all relevant payouts are enabled. After step 1 4 0 9 0, the telephone communication handler 12100 is called in step 1 4 〇 7 0 to perform the call completion (if necessary), after which the handler 1 4050 terminates at step 1 4040. If the check in step 14 〇 8 为 is no, then the telephone communication handler 121 唤 is invoked in step 1 4070, and then the handler flow terminates in step 1 4040. Figure 15 is a flow chart depicting the logic implemented by the token management handler 12060, which handles the generation, deletion, state modification, and retrieval of management capability tokens, in accordance with a second embodiment of the present invention. As shown, step 1 5 〇 〇 〇 first checks to determine if the current handler request requires the generation of a token. If the current processor request is for the generation of the request token, then in step 1 5 〇 1 , (if specified in the handler 12060 request), the user 1 iiooo is prompted to verify that the break is a token. If not, the handler 1 2 0 60 terminates at step 15〇6〇. If the user 1 wants to generate a token, then in step 15020, the handler 12060 retrieves all of the required data for the token. Such data includes, but is not limited to, the phone number of the call originator and the target, and the user identification (I D ) for the target user (e.g., user 2 1 1 1 1 0 1 0). As in the first embodiment, the user identification is the Same t i me identification of the target user, but the present invention also supports other forms including, but not limited to, a user identification/password X pair. Next, in step 1 5 0 3 0, an token object is generated for the given information, this
第34頁 1299454 五、發明說明(28) ^件包含但不限於:Java類的實例。步驟1 5 040中,儲存 二δ己物件於符記資料庫1 2 0 8 0中,而步驟1 5 0 5 0中,傳送符 。己存在的一通知給目標使用者(例如使用者2丨丨〇丨〇 )。 此通知係使用通知處置器1 20 50,以Sametime訊息傳送, 此訊f包含一URL,當此URL·被檢索,會提供檢索者可用來 運用符記的小應用程式。步驟15〇5〇之後,處置器12〇6〇終 止=步驟1 5 0 6 0。其他情形下,回到步驟丨5 〇 〇 〇,若目前處 置,要求並非要求符記的產生,則於步驟1 5 0 70做檢查以 =置器1 20 60要求是否要求符記刪除。若處置器lm〇 要求是要求符記刪除,則於步驟15〇8〇識別出相關符記, 並將之自符記資料庫12〇8〇刪除,接著處置器12〇6〇終止於 步驟1 50 6 0。假如相反地,目前處置器要求並非要求符記 ,除,於步驟1 5090決定處置器1 2 0 60要求是否要失能一或 夕個符圯。若是要求符記失能,則於步驟丨5丨〇 〇中,識別 ,所有巧關符記,於步驟1511〇令,在符記資料庫12_將 母一個廷些符記標示為已失能,接著處置器12〇6〇終止於 乂驟15060。另外,若目前處置器要求並非要符記失能, 則流程繼續到步驟15120,以決定管理處置器12〇6〇要求是 ^要致能一或多個符記。若管理處置器丨2 〇 6 〇要求是要致 旎一或多個符記,則流程繼續到步驟丨51 30,識別出所有 相關符圮,且於步驟1 51 4 0中,在符記資料庫丨2 〇 8 〇標示為 已致能,接著處置器1 2 0 6 0終止於步驟1 5 〇 6 〇。若步驟 15120做的檢查並不決定管理處置器12〇6()要求是要致能一 或多個符記,則喚起步驟1 5丨5 〇以決定此要求是否要檢索Page 34 1299454 V. INSTRUCTIONS (28) ^Parts include but are not limited to: Examples of Java classes. In step 1 5 040, the second δ object is stored in the symbol database 1 2 0 8 0, and in the step 1 5 0 50, the character is transmitted. A notification that already exists to the target user (eg user 2丨丨〇丨〇). This notification is transmitted by the Sametime message using the notification handler 1 20 50. This message f contains a URL, and when the URL is retrieved, it provides an applet that the searcher can use to use the token. After step 15〇5〇, the handler 12〇6〇 terminates = step 1 5 0 6 0. In other cases, go back to step 丨5 〇 〇 〇. If the current requirement is not to require the generation of the token, then check in step 1 5 0 70 to determine if the request is required to be deleted. If the processor lm〇 request is to require the deletion of the token, then the relevant token is identified in step 15〇8〇 and deleted from the token database 12〇8〇, and then the handler 12〇6〇 terminates in step 1 50 6 0. If, conversely, the current handler request is not a requirement, except in step 1 5090, it is determined whether the handler 1 2 0 60 requires disabling one or the other. If the request is disabled, then in step 丨5丨〇〇, identify all the signatures, and in step 1511, in the token database 12_ mark the parent token as disabled. Then, the handler 12〇6〇 terminates at step 15060. Additionally, if the current handler request is not to be disabled, then flow continues to step 15120 to determine that the management handler 12 is required to enable one or more tokens. If the management handler 丨2 〇6 〇 request is to cause one or more tokens, the flow proceeds to step 丨 51 30, identifying all relevant tokens, and in step 1 51 4 0, in the token data The library 2 〇 8 〇 is marked as enabled, and then the handler 1 2 0 6 0 terminates in step 1 5 〇 6 〇. If the check made in step 15120 does not determine that the management handler 12〇6() request is to enable one or more tokens, then step 1 5丨5 唤 is invoked to determine if the request is to be retrieved.
12994541299454
五、發明說明(29) 一或多個符記。若步驟1 5 1 5 0的檢查決定並非要檢索符 記,則處置器1 206 0終止於步驟1 50 60。否則,此流程繼續 至步驟15 160,以識別所有相關符記,之後於步驟1517〇 ^ 生一網頁,包含針對每一對應符記的小應用裎.式,每一個 這些小應用程式容許網頁之接收者運用對應符記。於步驟 15180,此網頁被回傳給要求者,接著處置器終止於步^驟 15060 。 ' 圖十六為一流程圖,描繪根據本發明第二實施例,符 記回應處置器1 2070實施的邏輯。以下描述符記回應處置@ 器1 2070如何管理從使用者2 11010來的回應,但應\里&解, 此處置器也可管理從任何使用者來的符記回應。步驟 16000中’檢查要求是否為符記接受(c〇Up〇n〜' acceptance )。若是,則於步驟16010中,處置器12〇7〇要 求電話通訊處置器12100在電話網路11060中、裝置11〇2〇 與使用者2 11010的電話網路節點丨1〇4〇間產生_通訊通 道在步驟16020檢查此嘗試,若不成功,於步驟16030傳 送失敗通知給回應使用者(使用者2丨丨〇丨〇 ),接著符記 回應處置器1 20 70終止於步驟1 6040。熟此技藝者可理解, 使用者2 11 〇1〇稍後可再次嘗試與運用符記。若產生成 功,則處置器1 2070繼續至步驟16〇8〇,將符記的再試 (retry)汁數為(若有的話)遞減,接著於步驟Μ⑽〇檢 查是否還有再試(retries )。若沒有剰下再試,處置 12070終止於步驟16040。否則,於步驟161〇〇中,處置器V. Description of invention (29) One or more tokens. If the check of step 1 5 1 50 determines that the token is not to be retrieved, then the handler 1 206 0 terminates at step 1 50 60. Otherwise, the process continues to step 15 160 to identify all relevant tokens, and then in step 1517, a web page is generated, including a small application for each corresponding token, each of which allows the webpage to be The recipient uses the corresponding token. At step 15180, the web page is passed back to the requester, and the handler terminates at step 15060. Figure 16 is a flow chart depicting the logic implemented by the token response handler 1 2070 in accordance with a second embodiment of the present invention. The following descriptors respond to how Disposition 1 2070 manages the response from User 2 11010, but should be \li & solution, this handler can also manage the response from any user. In step 16000, the check request is accepted (c〇Up〇n~' acceptance). If so, in step 16010, the handler 12〇7 requests the telephony processor 12100 to generate between the telephony network 11060, the device 11〇, and the telephone network node 11010 of the user 2 11010. The communication channel checks the attempt at step 16020. If unsuccessful, a failure notification is sent to the responding user (user 2) in step 16030, and then the token response handler 1 20 70 terminates at step 1 6040. It will be understood by those skilled in the art that the user can try and use the token again later. If a success occurs, the handler 1 2070 continues to step 16〇8〇, decrementing the number of retry juices (if any), and then checking for retries at step 10(10). If no attempt is made, the treatment 12070 terminates at step 16040. Otherwise, in step 161, the handler
第36頁 1299454Page 36 1299454
五、發明說明(30) 1 2070喚起符記管理處置器12〇6〇來刪除目前的符記, 處置器12070終止於步驟16040。 回到步驟1 600 0,若接收的回應並非接受符記,於步 驟16100,處置器1 2070檢查回應是否拒絕符記的通訊要 求,若^,於步驟16100中,喚起符記管理處置器12〇6〇來 刪除目前的符記,接著處置器1 2070終止於步驟16〇4〇。假 如此回應不是對符記的拒絕,處置器12〇7〇終止於 1 6040。 圖十七係描繪基於本發明第一實施例,通訊能力符記 為基礎的商業流程之範例,參照圖一至十有詳細描述。熟 此技藝者可理解,其亦可應用於第二實施例,通訊能力& έ己的任何其他用途也是一樣。如所示,步驟1 7 0 0 0中,使 用者1 2500為使用者2 25 1 0產生一通訊能力符記,亦即使 用者2藉此符記可於電話網路257〇中,建立至使用者1 2^00的通訊通道。如已述,即使使用者1 25〇〇的電話網路 節點2530使用中,一給定通訊能力符記可提供使用者2建 立通Λ通道的能力,這是在此給定符記被產生且儲存於符 記資料庫308〇時可以指定的選項。步驟17010中,監視符 ,,使用’且儲存所有相關數據於符記資料庫3〇8〇中的給 定符記的項目中。此監視與資料庫更新係由電信處置器 3050、符記管理處置器3〇6〇、以及符記回應處置器3〇7〇執 行’這二個處置器分別參照圖五、六、和七有詳細描述。V. Description of the Invention (30) 1 2070 invokes the token management handler 12〇6〇 to delete the current token, and the handler 12070 terminates at step 16040. Returning to step 1 600 0, if the received response is not an acceptance token, in step 16100, the handler 1 2070 checks whether the response rejects the communication request of the token, and if so, in step 16100, the token management handler 12 is invoked. 6〇 to delete the current token, then the handler 1 2070 ends in step 16〇4〇. False This response is not a rejection of the token, and the processor 12〇7〇 terminates at 1 6040. Figure 17 is a diagram showing an example of a business process based on the communication capability token based on the first embodiment of the present invention, which is described in detail with reference to Figs. It will be understood by those skilled in the art that it can also be applied to the second embodiment, as well as any other use of communication capabilities & As shown, in step 1700, the user 1 2500 generates a communication capability token for the user 2 251, that is, the user 2 can establish the token in the telephone network 257. User 1 2 ^ 00 communication channel. As already mentioned, even if the user's 25 电话 telephone network node 2530 is in use, a given communication capability token can provide the user 2 with the ability to establish an overnight channel, where the given token is generated and The options that can be specified when stored in the symbol library 308. In step 17010, the monitor character, 'use' and store all relevant data in the item of the given token in the token database 3〇8〇. This monitoring and database update is performed by the telecom handler 3050, the token management processor 3〇6, and the token response handler 3〇7〇. These two processors are respectively referred to Figures 5, 6, and 7. A detailed description.
第37頁 1299454 五、發明說明(31) 接下來在步 此時符記管 些費用可包 2 2 5 1 0間的 播選項也是 為了符記被 因是其讓使 與運算資源 可能。最後 2 5 0 0以及從 驟1 7 0 2 0 ’符記最後被刪掉,參照圖六所述 理處置器3 0 6 0將此符記產生的總費用列表"_ 含但不限於:由於產生使用者1 250 0鈿^ °足 υ υ和使用者 通道產生的任何與所有電話網路費用,& — π 使用插 。熟此技藝者可理解,使用者1 2 500甚至w < 收費,即使從未用它建立通訊,費用方丄可月b 買用屋生的;^ 用者2 25 1 0位於可使用的狀態。經ώ 不 、、工咁汁多姻々 (例如符記伺服器2580 ),使得這個、琴工=塔 ,於步驟1 7 0 3 0中,這些費用被穿 項憂為 使用者1 2500收取。 ⑺有1 雖然關於本發明的例示與執行的實施例ρ 4 , ^ 』匕破特別銪- 與描述,熟此技藝者應可理解,可做出形式鱼☆ # ”、貞不 和其他改變而不悖離本發明之精神與範疇& 〃則述 與範疇應只被所附申請專利範圍之範疇所限制。 < 精神Page 37 1299454 V. Invention Description (31) Next, in the step, the fee can be packaged. The 2 2 5 1 0 broadcast option is also for the purpose of writing the reason and the computing resources. The last 2 5 0 0 and the last 1 7 0 2 0 'features are finally deleted. Referring to Figure 6, the processor 3 0 6 0 lists the total cost of this token "_ with but not limited to: & π uses plug-in due to the cost of any telephone network generated by the user 1 250 钿 ^ ° υ υ and the user channel. It is understood by those skilled in the art that the user 1 2 500 or even w < charges, even if the communication is never used, the fee can be bought by the house b; the user 2 25 1 0 is in the usable state . After the ώ ώ , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , (7) There are 1 exemplified and executed embodiments of the present invention ρ 4 , ^ 匕 铕 铕 铕 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 与 ☆ ☆ ☆ ☆ ☆ ☆ ☆ ☆ ☆ ☆ ☆ ☆ The spirit and scope of the invention and the scope of the invention should be limited only by the scope of the appended claims.
第38頁 1299454Page 38 1299454
圖式簡單說明 五、【圖式簡單說明】 鑒於詳細描述結合所附圖式,本發明之目的、特徵與 優點對熟此技藝者將變得清楚,其中: 〃 圖一顯示根據本發明第一實施例,本發明之流程的概 觀, 圖二為根據本發明第一實施例之網路圖; 圖三為根據本發明第一實施例符記伺服器之元件圖; 圖四為根據本發明第一實施例符記伺服器之邏輯 圖; 圖五為根據本發明第一實施例電信處置器之範例; 圖六為根據本發明第一實施例符記管理處置器之範 圖七為根據本發明第一實施例符記回應處置器之範 圖八為根據本發明第一實施例數據網路節點之元件 程圖圖九為根據本發明第一實施例數據網路節點之邏輯流BRIEF DESCRIPTION OF THE DRAWINGS The objects, features and advantages of the present invention will become apparent to those skilled in the <RTIgt; Embodiments, an overview of the flow of the present invention, FIG. 2 is a network diagram according to a first embodiment of the present invention; FIG. 3 is a component diagram of a token server according to a first embodiment of the present invention; 1 is a logic diagram of a server; FIG. 5 is an example of a telegraph handler according to a first embodiment of the present invention; FIG. 6 is a diagram of a token management processor according to a first embodiment of the present invention. FIG. 9 is a schematic diagram of a data network node according to a first embodiment of the present invention. FIG. 9 is a logic flow of a data network node according to a first embodiment of the present invention.
觀;圖十顯示根據本發明第二實施例,本發明之流程的概 圖 ϊ 卞一為根據本發明第二實施例之網路圖; 圖 I — 圖· 卞二為根據本發明第二實施例數據網路節點之元件 圖十三為根據本發明第二實施例數據網路節點之邏輯Figure 10 shows an overview of the flow of the present invention in accordance with a second embodiment of the present invention. Figure 1 is a second embodiment of the present invention. Figure 1 - Figure 2 is a second embodiment of the present invention. Elements of an example data network node FIG. 13 is a logic of a data network node according to a second embodiment of the present invention.
第39頁 1299454 圖式間早說明 流程圖;Page 39 1299454 Schematic description of the flow chart;
圖十四為根據本發明第二實施例電信處置器之範例· 圖十五為根據本發明第二實施例符記管理處置器之範 圖十六為根據本發明第二實施例符記回應處置器 以及 ° 靶 圖十七為通訊能力符記為基礎的商業流程之範例。 圖式元件符號說明 250 0, 1 1 000 第一使用者 2510, 11010 第二使用 252 0,2540,1 1 030數據網路節點 考 2530,2550, 11040電話網路節點 2560,11050 數據網路 , , ηρ π 2 b 7 U, 1 1 0 6 0電話網路 2580符記伺服器 ! Ί n7n y 乙!11070通知飼服哭 3^〇, 8GH),__ 3010, δ020, 1 2〇1〇^ 3020,8030,1 2020數據網路介面 3030, 12030電話網路介面 3040,8040,12040 記憶體 3060, 12060符記管理處置器 器 σ 3080,12080符記資料庫 3100, 12090通知處置器Figure 14 is a diagram showing an example of a telecommunications handler in accordance with a second embodiment of the present invention. Figure 15 is a diagram showing a management of a token in accordance with a second embodiment of the present invention. And Figure 17 is an example of a business process based on communication capabilities. Schematic symbol description 250 0, 1 1 000 first user 2510, 11010 second use 252 0, 2540, 1 1 030 data network node test 2530, 2550, 11040 telephone network node 2560, 11050 data network, , ηρ π 2 b 7 U, 1 1 0 6 0 telephone network 2580 token server! Ί n7n y B! 11070 notice feeding clothes cry 3^〇, 8GH), __ 3010, δ020, 1 2〇1〇^ 3020, 8030, 1 2020 data network interface 3030, 12030 telephone network interface 3040, 8040, 12040 memory 3060, 12060 token management processor σ 3080, 12080 token database 3100, 12090 notification processor
3〇50, 1 20 50電信處置含 3〇7〇,1 2070符記回應處 3090交換機處置器 8000節點 8060客端通知處置器3〇50, 1 20 50 Telecommunications disposal includes 3〇7〇, 1 2070 token response office 3090 switch handler 8000 node 8060 client notification handler
805 0ΗΤΤΡ客端處置器805 0ΗΤΤΡ client processor
1299454 圖式簡單說明 1 1 0 2 0網路節點裝置 1 2 1 0 0電話通訊處置器1299454 Simple description of the diagram 1 1 0 2 0 network node device 1 2 1 0 0 telephone communication processor
第41頁Page 41
Claims (1)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/624,107 US7424537B2 (en) | 2003-07-21 | 2003-07-21 | Communication capability coupons |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200516406A TW200516406A (en) | 2005-05-16 |
| TWI299454B true TWI299454B (en) | 2008-08-01 |
Family
ID=34079926
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW093119483A TWI299454B (en) | 2003-07-21 | 2004-06-30 | Method and system for generating a communication coupon to establish a communication channel using a server |
Country Status (3)
| Country | Link |
|---|---|
| US (2) | US7424537B2 (en) |
| TW (1) | TWI299454B (en) |
| WO (1) | WO2005011247A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI484808B (en) * | 2010-03-10 | 2015-05-11 | Alibaba Group Holding Ltd | File transfer method based on archival directory and its device and system |
Families Citing this family (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7464139B2 (en) * | 2002-06-07 | 2008-12-09 | At&T Intellectual Property, I, L.P. | Methods for establishing an instant message conference |
| AU2003238901A1 (en) * | 2002-06-07 | 2003-12-22 | Bellsouth Intellectual Property Corporation | Sytems and methods for establishing electronic conferencing over a distributed network |
| IL159990A (en) | 2004-01-21 | 2008-03-20 | Eyal Eliav | Device, method and system for the application of content onto the surface of a beverage |
| US8006300B2 (en) * | 2006-10-24 | 2011-08-23 | Authernative, Inc. | Two-channel challenge-response authentication method in random partial shared secret recognition system |
| US20080273678A1 (en) | 2007-05-01 | 2008-11-06 | Igor Balk | Systems and methods for phone call management |
| US20080285588A1 (en) * | 2007-05-16 | 2008-11-20 | Unison Technologies Llc | Systems and methods for providing unified collaboration systems with combined communication log |
| US20080285736A1 (en) * | 2007-05-16 | 2008-11-20 | Unison Technolgies Llc | Systems and methods for providing unified collaboration systems with conditional communication handling |
| US20080285587A1 (en) * | 2007-05-16 | 2008-11-20 | Unison Technologies Llc | Systems and methods for providing unified collaboration systems with user selectable reply format |
| US8499085B2 (en) * | 2009-03-16 | 2013-07-30 | Avaya, Inc. | Advanced availability detection |
| US8706147B2 (en) * | 2009-06-22 | 2014-04-22 | Mitel Networks Corporation | Method, system and apparatus for enhancing digital voice call initiation between a calling telephony device and a called telephony device |
| US20110154222A1 (en) * | 2009-12-18 | 2011-06-23 | Microsoft Corporation | Extensible mechanism for conveying feature capabilities in conversation systems |
| US8631119B2 (en) * | 2010-03-24 | 2014-01-14 | International Business Machines Corporation | Interruptibility awareness service |
| US20130173372A1 (en) * | 2011-12-28 | 2013-07-04 | Navendu Misra | Electronic Coupon Management |
| US8811587B2 (en) | 2012-04-11 | 2014-08-19 | International Business Machines Corporation | Selectively filtering incoming communications events in a communications device |
| GB201317538D0 (en) * | 2013-10-03 | 2013-11-20 | Gage Networks Llp | A telecommunication system |
| AU2013409226A1 (en) | 2013-12-24 | 2016-06-16 | Telio Nederland B.V. | Callback telecommunication system |
| US20220308869A1 (en) * | 2021-03-26 | 2022-09-29 | International Business Machines Corporation | Computer management of microservices for microservice based applications |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5884272A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
| US5987108A (en) * | 1997-03-19 | 1999-11-16 | At&T Corp | Telephone billing with customer-defined budgeting |
| US6944278B1 (en) * | 1997-11-26 | 2005-09-13 | Sun Microsystems, Inc. | Internet-activated callback service |
| US6035031A (en) * | 1997-12-31 | 2000-03-07 | At&T Corp | Method and apparatus automatic call-back |
| US6169795B1 (en) * | 1998-03-30 | 2001-01-02 | International Business Machines Corporation | Internet telephony callback system and method of operation |
| US6535506B1 (en) | 1999-05-11 | 2003-03-18 | Click Interconnect, Inc. | Method and apparatus for establishing communications with a remote node on a switched network based on hypertext calling received from a packet network |
| US6449354B1 (en) * | 1999-06-08 | 2002-09-10 | Nortel Networks Limited | Communication system, article and method of configuring and establishing a connection therein |
| US6714544B1 (en) * | 1999-07-08 | 2004-03-30 | Alcatel Canada Inc. | Method and apparatus for proxied signalling of an end to end connection across a connection oriented network |
| US6895558B1 (en) * | 2000-02-11 | 2005-05-17 | Microsoft Corporation | Multi-access mode electronic personal assistant |
| US20020071539A1 (en) | 2000-07-25 | 2002-06-13 | Marc Diament | Method and apparatus for telephony-enabled instant messaging |
| GB2374689B (en) * | 2001-04-20 | 2005-11-23 | Eldama Systems Ip Ltd | Communications system |
| US20020164006A1 (en) | 2001-05-04 | 2002-11-07 | Weiss Lewis E. | Electronic document call back system |
| US20020188684A1 (en) | 2001-06-07 | 2002-12-12 | Robson Liang | Internet telephony directly initiated from electronic mails |
| US6724872B1 (en) * | 2001-12-17 | 2004-04-20 | Bellsouth Intellectual Property Corporation | Personalized messages over Internet call waiting |
| US7003305B2 (en) * | 2002-03-08 | 2006-02-21 | Motorola, Inc. | Method and apparatus for message callback in a communication system |
| US7203294B2 (en) * | 2002-08-06 | 2007-04-10 | At&T Corp. | System and method for dynamically routing communications |
| US20040078468A1 (en) | 2002-10-18 | 2004-04-22 | Jan Hedin | Proxy apparatus and method |
| US7319879B2 (en) * | 2002-12-31 | 2008-01-15 | Mototola, Inc. | Method and apparatus for providing dispatch-type services in a cellular communication system |
| US7117445B2 (en) * | 2003-06-30 | 2006-10-03 | Danger, Inc. | Multi-mode communication apparatus and interface for contacting a user |
| US7124123B1 (en) * | 2003-06-30 | 2006-10-17 | America Online, Inc. | Intelligent processing in the context of away and offline instant messages |
-
2003
- 2003-07-21 US US10/624,107 patent/US7424537B2/en not_active Expired - Fee Related
-
2004
- 2004-06-30 TW TW093119483A patent/TWI299454B/en not_active IP Right Cessation
- 2004-07-19 WO PCT/US2004/023126 patent/WO2005011247A1/en not_active Ceased
-
2008
- 2008-09-04 US US12/204,442 patent/US8190705B2/en not_active Expired - Lifetime
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI484808B (en) * | 2010-03-10 | 2015-05-11 | Alibaba Group Holding Ltd | File transfer method based on archival directory and its device and system |
Also Published As
| Publication number | Publication date |
|---|---|
| US20050021664A1 (en) | 2005-01-27 |
| WO2005011247A1 (en) | 2005-02-03 |
| US20080320101A1 (en) | 2008-12-25 |
| US8190705B2 (en) | 2012-05-29 |
| TW200516406A (en) | 2005-05-16 |
| US7424537B2 (en) | 2008-09-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| TWI299454B (en) | Method and system for generating a communication coupon to establish a communication channel using a server | |
| KR100870979B1 (en) | Method and system for wireless multimedia communication | |
| US7552166B2 (en) | Method of queuing requests to access a communications network | |
| US9462121B2 (en) | Systems and methods to confirm initiation of a callback | |
| US8107607B2 (en) | Integrated chat client with receiving party choice | |
| US8234289B2 (en) | Restoration of conversation stub for recognized experts | |
| US8774394B2 (en) | System and method for eliminating hold time in a telecommunications network | |
| CN103475791B (en) | For routeing the system and method for communication link | |
| KR20010085429A (en) | Personal information verification method in electronic-commerce system | |
| US20060245578A1 (en) | System and method for managing request priority in a telecommunications network | |
| CN101803356A (en) | Information registration system, server device, server processing program, and information registration method | |
| TW200303127A (en) | Apparatus and method for computer controlled call processing and information provision | |
| EP1677502A1 (en) | Method for providing presence information in a telecom network | |
| JP2005332179A (en) | Communication device, communication system, and communication method | |
| JP2006507771A (en) | Method and apparatus for adaptive message notification | |
| JP2002158766A (en) | Communication system and control method for its callback, and recording medium with control program for the callback recorded thereon | |
| JP4837719B2 (en) | Mail-based incoming billing system and method | |
| US20060250978A1 (en) | Personal communication interaction manager | |
| US20140317311A1 (en) | Communication routing plans that are based on communication device contact lists | |
| KR20180136650A (en) | Method and system for call delivery service | |
| JP6524447B2 (en) | Communication device, communication method, and program | |
| JP2005057320A (en) | Communications system | |
| JP2005063088A (en) | Authentication proxy server, authentication proxy method, and program | |
| JP2018163534A (en) | Answer control system, answer control server, answer control method, and answer control program | |
| JP2006050198A (en) | Telephone exchange testing device, and method thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |